Analysis

  • max time kernel
    131s
  • max time network
    149s
  • resource
    win10v191014

General

  • Target

    0f0a815fb89f99cf690ae43ec7761b2b3e8a07980d758158742217149bdc6089

  • Sample

    191129-66c3pr3epj

  • SHA256

    0f0a815fb89f99cf690ae43ec7761b2b3e8a07980d758158742217149bdc6089

Score
N/A

Malware Config

Extracted

Family

emotet

C2

211.218.105.101:80

197.90.159.42:80

201.183.251.100:80

50.63.13.135:8080

80.211.32.88:8080

222.239.249.166:443

192.161.190.171:8080

161.18.233.114:80

41.218.118.66:80

189.236.4.214:443

181.197.108.171:443

80.93.48.49:7080

212.129.14.27:8080

78.46.87.133:8080

200.71.112.158:53

216.75.37.196:8080

157.7.164.178:8081

195.201.56.68:7080

189.180.105.125:443

124.150.175.129:8080

rsa_pubkey.plain

Signatures

  • Checks system information in the registry (likely anti-VM) 2 TTPs 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • emotet family
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Drops file in system dir 11 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f0a815fb89f99cf690ae43ec7761b2b3e8a07980d758158742217149bdc6089.exe
    "C:\Users\Admin\AppData\Local\Temp\0f0a815fb89f99cf690ae43ec7761b2b3e8a07980d758158742217149bdc6089.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4932
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5012
  • C:\Windows\System32\SLUI.exe
    "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
    1⤵
      PID:5040
    • C:\Users\Admin\AppData\Local\Temp\0f0a815fb89f99cf690ae43ec7761b2b3e8a07980d758158742217149bdc6089.exe
      --6476713c
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Drops file in system dir
      • Suspicious behavior: RenamesItself
      PID:1676
    • C:\Windows\SysWOW64\netshserial.exe
      "C:\Windows\SysWOW64\netshserial.exe"
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:992
    • C:\Windows\SysWOW64\netshserial.exe
      --4621b09c
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Drops file in system dir
      • Suspicious behavior: EnumeratesProcesses
      PID:4376
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s BITS
      1⤵
      • Drops file in system dir
      PID:3624
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
      1⤵
        PID:4632
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s DoSvc
        1⤵
        • Checks system information in the registry (likely anti-VM)
        PID:4184
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc
        1⤵
        • Windows security modification
        PID:2924
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k unistacksvcgroup
        1⤵
          PID:2324

        Network

        MITRE ATT&CK Enterprise v15

        MITRE ATT&CK Additional techniques

        • T1089

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/992-3-0x0000000000E30000-0x0000000000E47000-memory.dmp

          Filesize

          92KB

        • memory/1676-2-0x00000000020D0000-0x00000000020E7000-memory.dmp

          Filesize

          92KB

        • memory/4376-5-0x0000000000D90000-0x0000000000DA7000-memory.dmp

          Filesize

          92KB

        • memory/4932-0-0x00000000007F0000-0x0000000000807000-memory.dmp

          Filesize

          92KB