Analysis

  • max time kernel
    131s
  • max time network
    149s
  • resource
    win10v191014

General

  • Target

    3062d6268485468083a97411cc30c8ce0c292dd1d6f73649383167d36f93c56e

  • Sample

    191129-tba2ymyvhn

  • SHA256

    3062d6268485468083a97411cc30c8ce0c292dd1d6f73649383167d36f93c56e

Score
N/A

Malware Config

Extracted

Family

emotet

C2

12.229.155.122:80

5.88.182.250:80

128.65.154.183:443

59.110.18.236:443

45.56.88.91:443

51.68.220.244:8080

206.81.10.215:8080

211.63.71.72:8080

171.101.153.86:990

95.128.43.213:8080

31.172.240.91:8080

167.99.105.223:7080

24.45.193.161:7080

104.131.11.150:8080

167.71.10.37:8080

104.131.44.150:8080

190.108.228.48:990

195.244.215.206:80

192.241.220.155:8080

209.97.168.52:8080

rsa_pubkey.plain

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks system information in the registry (likely anti-VM) 2 TTPs 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • emotet family
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Emotet Sync 1 IoCs
  • Drops file in system dir 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3062d6268485468083a97411cc30c8ce0c292dd1d6f73649383167d36f93c56e.exe
    "C:\Users\Admin\AppData\Local\Temp\3062d6268485468083a97411cc30c8ce0c292dd1d6f73649383167d36f93c56e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4880
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
  • C:\Windows\System32\SLUI.exe
    "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
    1⤵
      PID:4992
    • C:\Users\Admin\AppData\Local\Temp\3062d6268485468083a97411cc30c8ce0c292dd1d6f73649383167d36f93c56e.exe
      --4661cacc
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: EmotetMutantsSpam
      • Suspicious behavior: RenamesItself
      • Emotet Sync
      • Drops file in system dir
      PID:5080
    • C:\Windows\SysWOW64\groupiplk.exe
      "C:\Windows\SysWOW64\groupiplk.exe"
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:452
    • C:\Windows\SysWOW64\groupiplk.exe
      --4e0a81b
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: EmotetMutantsSpam
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in system dir
      PID:1916
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s BITS
      1⤵
      • Drops file in system dir
      PID:3676
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
      1⤵
        PID:4608
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s DoSvc
        1⤵
        • Checks system information in the registry (likely anti-VM)
        PID:3032
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc
        1⤵
        • Windows security modification
        PID:3020
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k unistacksvcgroup
        1⤵
          PID:4820

        Network

        MITRE ATT&CK Enterprise v16

        MITRE ATT&CK Additional techniques

        • T1089

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/452-4-0x0000000000AC0000-0x0000000000AD7000-memory.dmp

          Filesize

          92KB

        • memory/1916-6-0x00000000008F0000-0x0000000000907000-memory.dmp

          Filesize

          92KB

        • memory/1916-7-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/4880-0-0x00000000005F0000-0x0000000000607000-memory.dmp

          Filesize

          92KB

        • memory/5080-2-0x00000000005D0000-0x00000000005E7000-memory.dmp

          Filesize

          92KB

        • memory/5080-3-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB