Analysis

  • max time kernel
    150s
  • max time network
    152s
  • resource
    win10

General

  • Target

    3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0

  • Sample

    191015-ce9ejv6gcs

  • SHA256

    3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0

Score
N/A

Malware Config

Extracted

Family

emotet

C2

181.59.253.20:21

14.160.93.230:80

74.208.68.48:8080

104.131.58.132:8080

68.183.190.199:8080

62.75.143.100:7080

159.203.204.126:8080

151.80.142.33:80

123.168.4.66:22

46.28.111.142:7080

46.101.212.195:8080

183.82.97.25:80

190.10.194.42:8080

217.199.160.224:8080

186.1.41.111:443

185.86.148.222:8080

185.187.198.10:8080

200.57.102.71:8443

114.79.134.129:443

80.85.87.122:8080

rsa_pubkey.plain

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs
  • Emotet Sync 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam
  • Drops file in system dir 12 IoCs
  • Suspicious behavior: RenamesItself
  • Suspicious behavior: EnumeratesProcesses
  • emotet family

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0.exe
    "C:\Users\Admin\AppData\Local\Temp\3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3588
  • C:\Users\Admin\AppData\Local\Temp\3b84df99ab9980cfb87380d48f8819bd217eea2553e3e3d2a2942ab35a1688e0.exe
    --c091cf5b
    1⤵
    • Emotet Sync
    • Drops file in system dir
    PID:3612
  • C:\Windows\SysWOW64\tabletmspterm.exe
    "C:\Windows\SysWOW64\tabletmspterm.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3664
  • C:\Windows\SysWOW64\tabletmspterm.exe
    --356fff06
    1⤵
    • Drops file in system dir
    PID:3708
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1680
  • C:\Windows\System32\SLUI.exe
    "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
    1⤵
      PID:3956

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3588-0-0x0000000000480000-0x0000000000497000-memory.dmp

            Filesize

            92KB

          • memory/3612-2-0x0000000000400000-0x0000000000478000-memory.dmp

            Filesize

            480KB

          • memory/3664-3-0x0000000000D60000-0x0000000000D77000-memory.dmp

            Filesize

            92KB

          • memory/3708-4-0x00000000005E0000-0x00000000005F7000-memory.dmp

            Filesize

            92KB

          • memory/3708-5-0x0000000000400000-0x0000000000478000-memory.dmp

            Filesize

            480KB