Analysis

  • max time kernel
    112s
  • max time network
    151s
  • resource
    win7v191014

General

  • Target

    d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b

  • Sample

    191216-8xx41bl79n

  • SHA256

    d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b

Score
N/A

Malware Config

Extracted

Family

emotet

C2

66.209.97.122:8080

174.77.190.137:8080

104.137.176.186:80

165.227.156.155:443

167.99.105.223:7080

67.225.179.64:8080

176.31.200.130:8080

5.196.74.210:8080

82.155.161.203:80

101.187.247.29:80

120.150.246.241:80

73.11.153.178:8080

91.205.215.66:443

70.46.247.81:80

24.93.212.32:80

139.130.241.252:443

70.175.171.251:80

217.160.182.191:8080

104.236.246.93:8080

98.24.231.64:80

rsa_pubkey.plain

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs
  • Emotet Sync 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs
  • Drops file in system dir 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • emotet family
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe
    "C:\Users\Admin\AppData\Local\Temp\d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    PID:1064
  • C:\Users\Admin\AppData\Local\Temp\d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe
    --c4007a16
    1⤵
    • Emotet Sync
    • Suspicious behavior: EmotetMutantsSpam
    • Drops file in system dir
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:316
  • C:\Windows\SysWOW64\sensortexas.exe
    "C:\Windows\SysWOW64\sensortexas.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    PID:836
  • C:\Windows\SysWOW64\sensortexas.exe
    --aa44eb55
    1⤵
    • Suspicious behavior: EmotetMutantsSpam
    • Drops file in system dir
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/292-4-0x0000000000260000-0x0000000000277000-memory.dmp

    Filesize

    92KB

  • memory/292-5-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/316-1-0x0000000000390000-0x00000000003A7000-memory.dmp

    Filesize

    92KB

  • memory/316-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/836-3-0x0000000000280000-0x0000000000297000-memory.dmp

    Filesize

    92KB

  • memory/1064-0-0x0000000000310000-0x0000000000327000-memory.dmp

    Filesize

    92KB