Analysis

  • max time kernel
    136s
  • max time network
    145s
  • resource
    win10

General

  • Target

    4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2

  • Sample

    191015-av5jmcjvjj

  • SHA256

    4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2

Score
N/A

Malware Config

Extracted

Family

emotet

C2

181.59.253.20:21

14.160.93.230:80

74.208.68.48:8080

104.131.58.132:8080

68.183.190.199:8080

62.75.143.100:7080

159.203.204.126:8080

151.80.142.33:80

123.168.4.66:22

46.28.111.142:7080

46.101.212.195:8080

183.82.97.25:80

190.10.194.42:8080

217.199.160.224:8080

186.1.41.111:443

185.86.148.222:8080

185.187.198.10:8080

200.57.102.71:8443

114.79.134.129:443

80.85.87.122:8080

rsa_pubkey.plain

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs
  • Emotet Sync 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam
  • Drops file in system dir 6 IoCs
  • Suspicious behavior: RenamesItself
  • Suspicious behavior: EnumeratesProcesses
  • emotet family

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2.exe
    "C:\Users\Admin\AppData\Local\Temp\4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2860
  • C:\Users\Admin\AppData\Local\Temp\4ccb4e885119ed8356f145caa1856f0b617701c6fe85e2523a499ca4e2959da2.exe
    --9f7f7fa5
    1⤵
    • Emotet Sync
    • Drops file in system dir
    PID:3560
  • C:\Windows\SysWOW64\tabletmspterm.exe
    "C:\Windows\SysWOW64\tabletmspterm.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3084
  • C:\Windows\SysWOW64\tabletmspterm.exe
    --356fff06
    1⤵
    • Drops file in system dir
    PID:2944
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1300
  • C:\Windows\System32\SLUI.exe
    "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
    1⤵
      PID:1304

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2860-0-0x0000000000750000-0x0000000000767000-memory.dmp

      Filesize

      92KB

    • memory/2944-4-0x0000000000590000-0x00000000005A7000-memory.dmp

      Filesize

      92KB

    • memory/2944-5-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/3084-3-0x0000000000D70000-0x0000000000D87000-memory.dmp

      Filesize

      92KB

    • memory/3560-1-0x0000000000620000-0x0000000000637000-memory.dmp

      Filesize

      92KB

    • memory/3560-2-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB