Analysis
-
max time kernel
376s -
max time network
439s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09-03-2023 16:35
Behavioral task
behavioral1
Sample
t_gescanntes-Dokument 2023.09.03_0851.doc
Resource
win7-20230220-en
General
-
Target
t_gescanntes-Dokument 2023.09.03_0851.doc
-
Size
381KB
-
MD5
1640c9beb6c7afe550ba2e2d7584f179
-
SHA1
74e2fcb40aa441192b94d57cb46d6aed9bd1b353
-
SHA256
558017ae9c3c65e65d03ded1a32e0c873c379be2bcf52c321b5cb4a12d04f18a
-
SHA512
9b0869ad92708cee4446781589589a48bb4d3cb433ed9695e79d5ce65e8b962e9cea51dbd2885a85892f6c0bdcf4dea2e3ebdaac14ede15d8659f1be029a5287
-
SSDEEP
6144:E9fcsHgsTGbWqjWQ6e7t/5MIUAWuVfzmSsWnpoWgXEyV/FF:2fPPGBWQ6CBMIUreiSXgXtF
Malware Config
Extracted
emotet
Epoch4
129.232.188.93:443
164.90.222.65:443
159.65.88.10:8080
172.105.226.75:8080
115.68.227.76:8080
187.63.160.88:80
169.57.156.166:8080
185.4.135.165:8080
153.126.146.25:7080
197.242.150.244:8080
139.59.126.41:443
186.194.240.217:443
103.132.242.26:8080
206.189.28.199:8080
163.44.196.120:8080
95.217.221.146:8080
159.89.202.34:443
119.59.103.152:8080
183.111.227.137:8080
201.94.166.162:443
103.75.201.2:443
149.56.131.28:8080
79.137.35.198:8080
5.135.159.50:443
66.228.32.31:7080
91.121.146.47:8080
153.92.5.27:8080
45.235.8.30:8080
72.15.201.15:8080
107.170.39.149:8080
45.176.232.124:443
82.223.21.224:8080
167.172.199.165:8080
213.239.212.5:443
202.129.205.3:8080
94.23.45.86:4143
147.139.166.154:8080
167.172.253.162:8080
91.207.28.33:8080
188.44.20.25:443
104.168.155.143:8080
110.232.117.186:8080
164.68.99.3:8080
1.234.2.232:8080
173.212.193.249:8080
182.162.143.56:443
160.16.142.56:8080
101.50.0.91:8080
103.43.75.120:443
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 828 4244 regsvr32.exe WINWORD.EXE -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 828 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4244 WINWORD.EXE 4244 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 828 regsvr32.exe 828 regsvr32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
WINWORD.EXEpid process 4244 WINWORD.EXE 4244 WINWORD.EXE 4244 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 4244 WINWORD.EXE 4244 WINWORD.EXE 4244 WINWORD.EXE 4244 WINWORD.EXE 4244 WINWORD.EXE 4244 WINWORD.EXE 4244 WINWORD.EXE 4244 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEregsvr32.exedescription pid process target process PID 4244 wrote to memory of 828 4244 WINWORD.EXE regsvr32.exe PID 4244 wrote to memory of 828 4244 WINWORD.EXE regsvr32.exe PID 828 wrote to memory of 1960 828 regsvr32.exe regsvr32.exe PID 828 wrote to memory of 1960 828 regsvr32.exe regsvr32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\t_gescanntes-Dokument 2023.09.03_0851.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\173539.tmp"2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\DxQKTOC\mBePitAGPvJNK.dll"3⤵PID:1960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524.5MB
MD5a0287a67f0e7ead4fe5b79aa2ce9c137
SHA11189232ef27f4fd2781c6a53e5254ce45feec8d4
SHA25605209852a496328059098627af1904363a7ee4e6ca55e0668a86c6cb41593c98
SHA51242e6b694fbf2712be497a61263d0eb89a5ea154a28c0bf8ee51cec430e277cba6bea2799068468891f8cd1d9acbdf7f80275c49aff965156c50b8e3076fdc012
-
Filesize
809KB
MD563d58614f9189e23ee7b8333f4b4f6e8
SHA1acbda6886b6df41e63c147e017519a0db73ab1dc
SHA2562731682e54ae177a22dac9194431be2be3224da56bce5efbbb56c793fe2ad4c5
SHA512ae40bacf465b6ec265775ffb071def8d6ca35994f6a3910242e436f86264964b9cb223fe9a40750bfff0a780a9d612f17288c3f97979d7b48ae588f5863775ad
-
Filesize
524.5MB
MD5a0287a67f0e7ead4fe5b79aa2ce9c137
SHA11189232ef27f4fd2781c6a53e5254ce45feec8d4
SHA25605209852a496328059098627af1904363a7ee4e6ca55e0668a86c6cb41593c98
SHA51242e6b694fbf2712be497a61263d0eb89a5ea154a28c0bf8ee51cec430e277cba6bea2799068468891f8cd1d9acbdf7f80275c49aff965156c50b8e3076fdc012