Analysis
-
max time kernel
131s -
max time network
151s -
resource
win10v191014
Task
task1
Sample
d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe
Resource
win7v191014
General
-
Target
d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b
-
Sample
191216-8xx41bl79n
-
SHA256
d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b
Malware Config
Extracted
emotet
66.209.97.122:8080
174.77.190.137:8080
104.137.176.186:80
165.227.156.155:443
167.99.105.223:7080
67.225.179.64:8080
176.31.200.130:8080
5.196.74.210:8080
82.155.161.203:80
101.187.247.29:80
120.150.246.241:80
73.11.153.178:8080
91.205.215.66:443
70.46.247.81:80
24.93.212.32:80
139.130.241.252:443
70.175.171.251:80
217.160.182.191:8080
104.236.246.93:8080
98.24.231.64:80
37.157.194.134:443
2.235.190.23:8080
37.59.24.177:8080
144.139.247.220:80
206.81.10.215:8080
85.72.180.68:80
81.0.63.86:8080
116.48.142.21:443
104.131.44.150:8080
212.64.171.206:80
5.88.182.250:80
190.220.19.82:443
73.214.99.25:80
61.197.110.214:80
197.254.221.174:80
31.131.182.30:80
5.154.58.24:80
64.53.242.181:8080
45.51.40.140:80
110.142.38.16:80
206.189.112.148:8080
73.176.241.255:80
100.14.117.137:80
2.237.76.249:80
176.106.183.253:8080
87.106.139.101:8080
83.136.245.190:8080
186.67.208.78:8080
128.65.154.183:443
159.65.25.128:8080
178.209.71.63:8080
64.147.15.138:80
188.152.7.140:80
190.53.135.159:21
80.21.182.46:80
50.116.86.205:8080
47.6.15.79:80
87.106.136.232:8080
110.143.84.202:80
62.75.187.192:8080
31.31.77.83:443
189.209.217.49:80
167.71.10.37:8080
218.44.21.114:80
107.170.24.125:8080
59.103.164.174:80
173.91.11.142:80
182.176.132.213:8090
211.63.71.72:8080
209.97.168.52:8080
201.251.133.92:443
169.239.182.217:8080
190.12.119.180:443
173.12.14.133:8080
87.230.19.21:8080
192.241.255.77:8080
108.191.2.72:80
138.59.177.106:443
195.244.215.206:80
190.226.44.20:21
78.24.219.147:8080
85.152.174.56:80
66.76.63.99:80
2.38.99.79:80
201.184.105.242:443
110.143.57.109:80
92.222.216.44:8080
165.228.24.197:80
1.33.230.137:80
68.118.26.116:80
47.6.15.79:443
95.128.43.213:8080
47.156.70.145:80
31.172.240.91:8080
46.105.131.87:80
59.148.227.190:80
101.187.134.207:443
209.141.54.221:8080
183.102.238.69:465
74.105.102.97:8080
104.131.11.150:8080
212.129.24.79:8080
190.147.215.53:22
58.171.42.66:8080
86.98.156.239:443
201.173.217.124:443
178.210.51.222:8080
12.176.19.218:80
181.57.193.14:80
45.33.49.124:443
66.34.201.20:7080
210.6.85.121:80
179.13.185.19:80
108.179.206.219:8080
93.147.141.5:80
75.80.148.244:80
103.86.49.11:8080
91.73.197.90:80
200.7.243.108:443
186.75.241.230:80
149.202.153.252:8080
Signatures
-
Checks system information in the registry (likely anti-VM) 2 TTPs 2 IoCs
description ioc pid Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer 4180 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 4180 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4972 4892 d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe 73 PID 4988 wrote to memory of 5016 4988 SppExtComObj.exe 75 PID 324 wrote to memory of 1888 324 attribchar.exe 79 -
description ioc pid Process Event created Global\ED9D4152B 4972 d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe -
Suspicious behavior: EmotetMutantsSpam 2 IoCs
pid Process 4972 d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe 1888 attribchar.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4972 d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1888 attribchar.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4892 d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe 4972 d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe 324 attribchar.exe 1888 attribchar.exe -
Drops file in system dir 11 IoCs
description ioc pid Process File renamed C:\Users\Admin\AppData\Local\Temp\d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe => C:\Windows\SysWOW64\attribchar.exe 4972 d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat 1888 attribchar.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 1888 attribchar.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE 1888 attribchar.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies 1888 attribchar.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 1888 attribchar.exe File opened for modification C:\Windows\Debug\ESE.TXT 4032 svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp 4032 svchost.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp 4032 svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-2.tmp 4032 svchost.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-2.tmp 4032 svchost.exe -
description ioc pid Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\cval = "0" 3992 svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\cval = "1" 3992 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe"C:\Users\Admin\AppData\Local\Temp\d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
PID:4892
-
C:\Users\Admin\AppData\Local\Temp\d926bffb7d4d8e2cac599c5ad0acdd3ec04001481f26a507f7bd15287aa85f1b.exe--c4007a161⤵
- Emotet Sync
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Drops file in system dir
PID:4972
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4988
-
C:\Windows\System32\SLUI.exe"C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent1⤵PID:5016
-
C:\Windows\SysWOW64\attribchar.exe"C:\Windows\SysWOW64\attribchar.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
PID:324
-
C:\Windows\SysWOW64\attribchar.exe--b85c6d321⤵
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Drops file in system dir
PID:1888
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Drops file in system dir
PID:4032
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵PID:3168
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DoSvc1⤵
- Checks system information in the registry (likely anti-VM)
PID:4180
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc1⤵
- Windows security modification
PID:3992
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup1⤵PID:3028
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Additional techniques
- T1089