Analysis
-
max time kernel
26s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2023 14:04
Behavioral task
behavioral1
Sample
INVOICE N IJ952634 March 2023.doc
Resource
win7-20230220-en
General
-
Target
INVOICE N IJ952634 March 2023.doc
-
Size
514.2MB
-
MD5
569dd57886777d0e9aa72151ae32cf7d
-
SHA1
8be53083637a60ee102d8e5fbb8fb0d7df33bab7
-
SHA256
b63617eda3505c9ab6deb672f33ca196f508b6cd5eb1cc00ec5c2500a35c18a6
-
SHA512
13c5f79efa16d93c4b0a8c5f7ff31aae5f4087d10254167e1b1359b7b8ed4f32e116e00fc97d31124345bbb5726371079b9216fd95c5768722daf0a8299ccbc6
-
SSDEEP
3072:eoEW2aOtFjH0lP2IpjctfRcVVwEi/A8NVM1wIOCbX6bYLjWFJuvx7ueK6:ZE1aOtFa2I9c3aVw4zwxCbJ4Jup
Malware Config
Extracted
emotet
Epoch4
164.68.99.3:8080
164.90.222.65:443
186.194.240.217:443
1.234.2.232:8080
103.75.201.2:443
187.63.160.88:80
147.139.166.154:8080
91.207.28.33:8080
5.135.159.50:443
153.92.5.27:8080
213.239.212.5:443
103.43.75.120:443
159.65.88.10:8080
167.172.253.162:8080
153.126.146.25:7080
119.59.103.152:8080
107.170.39.149:8080
183.111.227.137:8080
159.89.202.34:443
110.232.117.186:8080
129.232.188.93:443
172.105.226.75:8080
197.242.150.244:8080
188.44.20.25:443
66.228.32.31:7080
91.121.146.47:8080
202.129.205.3:8080
45.176.232.124:443
160.16.142.56:8080
94.23.45.86:4143
95.217.221.146:8080
72.15.201.15:8080
167.172.199.165:8080
115.68.227.76:8080
139.59.126.41:443
185.4.135.165:8080
79.137.35.198:8080
206.189.28.199:8080
163.44.196.120:8080
201.94.166.162:443
104.168.155.143:8080
173.212.193.249:8080
45.235.8.30:8080
169.57.156.166:8080
149.56.131.28:8080
182.162.143.56:443
103.132.242.26:8080
82.223.21.224:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3008 1104 regsvr32.exe WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 44 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 45 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 54 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 57 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 61 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 40 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1104 WINWORD.EXE 1104 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
WINWORD.EXEpid process 1104 WINWORD.EXE 1104 WINWORD.EXE 1104 WINWORD.EXE 1104 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1104 wrote to memory of 3008 1104 WINWORD.EXE regsvr32.exe PID 1104 wrote to memory of 3008 1104 WINWORD.EXE regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\INVOICE N IJ952634 March 2023.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\140542.tmp"2⤵
- Process spawned unexpected child process
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\OHhKYaMB\dWnjUIHSF.dll"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\140542.tmpFilesize
87.1MB
MD5c8f331826d46b2cc90ccbd71db5e88a4
SHA1d412a873bcf0754a2f3848c4eefb10de64e0941a
SHA25654c10e64590b9d9eacc1ef9d13fc7ffdcd207cc3c2c4eda8c766b03ee5f1fad4
SHA51297de36d4549d0b20f4df61f77cb440bacf682d21d5286f3237b8dfaa333d9aed9a4d15cf9dca5900b6ffb155ca8f40c6f89bdd45e66d9e3cd8e33cf3521f040f
-
C:\Users\Admin\AppData\Local\Temp\140542.tmpFilesize
86.7MB
MD5d6db6e217b60a845a532a6b606b27f28
SHA1dc2426b56baf929fefbb0ef4fb1c21b330b0adef
SHA25662846c4fe49cbd92c816aeab2d705515affc05f12dcd9a5e067833c152f13ad1
SHA512ed1a0a0a82de437fb2a0a6cd0e8b9e3fc8ecfe473858ac56501979b10e10552879714d3bd3ad8ba8f86c9b15fc999c9ec021bac0b1e9e106c4bee82dca8cbb9d
-
C:\Users\Admin\AppData\Local\Temp\140553.zipFilesize
815KB
MD5ed4fcdbf38c45e8b61f0364b90416651
SHA102640c01c30f89e3dc1ece2c001c0121cd648057
SHA2561f78d5f7eb645523205b4a42b84060253f2c3c19e7f4ef5b776391fff23b87d4
SHA512505767be56fa466804657cf659bace3868af56b121c7feaa542a8ae5b0f243bde179b5828a28d775d3d5fef06935b3edbfea752bc1c330252f7e2215ef17e31c
-
C:\Windows\System32\OHhKYaMB\dWnjUIHSF.dllFilesize
73.9MB
MD57a82f30c301ed843179dd5a0a0c3d3cc
SHA1872876a531aac9fb96bd9ab46b30b1e69decf414
SHA25630a814fbbea7c1992fb390accaf37b2eeed99434aeee85a0e79c51d5f87bd207
SHA512954f4debfd6a3902b1e9c89d9fa8fc82b00e0ebbfd1d008a64bce82d908fe06e0c09f1efb3718c8855a8f32535e3cf3e111774432ca979454769263148079997
-
memory/1104-137-0x00007FFC2CE10000-0x00007FFC2CE20000-memory.dmpFilesize
64KB
-
memory/1104-138-0x00007FFC2A730000-0x00007FFC2A740000-memory.dmpFilesize
64KB
-
memory/1104-139-0x00007FFC2A730000-0x00007FFC2A740000-memory.dmpFilesize
64KB
-
memory/1104-136-0x00007FFC2CE10000-0x00007FFC2CE20000-memory.dmpFilesize
64KB
-
memory/1104-135-0x00007FFC2CE10000-0x00007FFC2CE20000-memory.dmpFilesize
64KB
-
memory/1104-134-0x00007FFC2CE10000-0x00007FFC2CE20000-memory.dmpFilesize
64KB
-
memory/1104-133-0x00007FFC2CE10000-0x00007FFC2CE20000-memory.dmpFilesize
64KB
-
memory/1104-201-0x00007FFC2CE10000-0x00007FFC2CE20000-memory.dmpFilesize
64KB
-
memory/1104-202-0x00007FFC2CE10000-0x00007FFC2CE20000-memory.dmpFilesize
64KB
-
memory/1104-203-0x00007FFC2CE10000-0x00007FFC2CE20000-memory.dmpFilesize
64KB
-
memory/3008-178-0x0000000180000000-0x000000018002D000-memory.dmpFilesize
180KB
-
memory/3008-181-0x0000000002470000-0x0000000002471000-memory.dmpFilesize
4KB