Analysis

  • max time kernel
    103s
  • max time network
    151s
  • resource
    win7

General

  • Target

    4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2

  • Sample

    191015-av5jmcjvjj

  • SHA256

    4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2

Score
N/A

Malware Config

Extracted

Family

emotet

C2

181.59.253.20:21

14.160.93.230:80

74.208.68.48:8080

104.131.58.132:8080

68.183.190.199:8080

62.75.143.100:7080

159.203.204.126:8080

151.80.142.33:80

123.168.4.66:22

46.28.111.142:7080

46.101.212.195:8080

183.82.97.25:80

190.10.194.42:8080

217.199.160.224:8080

186.1.41.111:443

185.86.148.222:8080

185.187.198.10:8080

200.57.102.71:8443

114.79.134.129:443

80.85.87.122:8080

rsa_pubkey.plain

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs
  • Emotet Sync 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam
  • Drops file in system dir 2 IoCs
  • Suspicious behavior: RenamesItself
  • Suspicious behavior: EnumeratesProcesses
  • emotet family

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2.exe
    "C:\Users\Admin\AppData\Local\Temp\4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1376
  • C:\Users\Admin\AppData\Local\Temp\4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2.exe
    --9f7f7fa5
    1⤵
    • Emotet Sync
    • Drops file in system dir
    PID:1324
  • C:\Windows\SysWOW64\loadarouter.exe
    "C:\Windows\SysWOW64\loadarouter.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1104
  • C:\Windows\SysWOW64\loadarouter.exe
    --f7a216da
    1⤵
    • Drops file in system dir
    PID:1084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1084-4-0x0000000000250000-0x0000000000267000-memory.dmp

    Filesize

    92KB

  • memory/1084-5-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1104-3-0x00000000002F0000-0x0000000000307000-memory.dmp

    Filesize

    92KB

  • memory/1324-1-0x0000000000320000-0x0000000000337000-memory.dmp

    Filesize

    92KB

  • memory/1324-2-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1376-0-0x0000000000240000-0x0000000000257000-memory.dmp

    Filesize

    92KB