Analysis

  • max time kernel
    104s
  • max time network
    115s
  • resource
    win7

General

  • Target

    3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0

  • Sample

    191015-ce9ejv6gcs

  • SHA256

    3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0

Score
N/A

Malware Config

Extracted

Family

emotet

C2

181.59.253.20:21

14.160.93.230:80

74.208.68.48:8080

104.131.58.132:8080

68.183.190.199:8080

62.75.143.100:7080

159.203.204.126:8080

151.80.142.33:80

123.168.4.66:22

46.28.111.142:7080

46.101.212.195:8080

183.82.97.25:80

190.10.194.42:8080

217.199.160.224:8080

186.1.41.111:443

185.86.148.222:8080

185.187.198.10:8080

200.57.102.71:8443

114.79.134.129:443

80.85.87.122:8080

rsa_pubkey.plain

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs
  • Emotet Sync 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam
  • Drops file in system dir 7 IoCs
  • Suspicious behavior: RenamesItself
  • Suspicious behavior: EnumeratesProcesses
  • emotet family

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0.exe
    "C:\Users\Admin\AppData\Local\Temp\3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1388
  • C:\Users\Admin\AppData\Local\Temp\3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0.exe
    --c091cf5b
    1⤵
    • Emotet Sync
    • Drops file in system dir
    PID:1336
  • C:\Windows\SysWOW64\loadarouter.exe
    "C:\Windows\SysWOW64\loadarouter.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
  • C:\Windows\SysWOW64\loadarouter.exe
    --f7a216da
    1⤵
    • Drops file in system dir
    PID:1112

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1112-4-0x0000000000250000-0x0000000000267000-memory.dmp

          Filesize

          92KB

        • memory/1112-5-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1304-3-0x00000000001E0000-0x00000000001F7000-memory.dmp

          Filesize

          92KB

        • memory/1336-1-0x00000000002E0000-0x00000000002F7000-memory.dmp

          Filesize

          92KB

        • memory/1336-2-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1388-0-0x00000000003C0000-0x00000000003D7000-memory.dmp

          Filesize

          92KB