Analysis
-
max time kernel
114s -
resource
win7v191014 -
submitted
01-02-2020 04:35
Task
task1
Sample
72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe
Resource
win7v191014
General
Malware Config
Extracted
emotet
45.55.179.121:8080
198.211.121.27:8080
75.127.14.170:8080
181.167.35.84:80
163.172.107.70:8080
58.92.179.55:443
154.70.158.97:80
181.39.96.86:443
68.183.18.169:8080
217.12.70.226:80
78.210.132.35:80
78.189.60.109:443
176.58.93.123:80
178.33.167.120:8080
201.183.251.100:80
78.189.165.52:8080
142.93.87.198:8080
82.145.43.153:8080
185.244.167.25:443
192.210.217.94:8080
89.215.225.15:80
98.192.74.164:80
190.63.7.166:8080
46.17.6.116:8080
82.165.15.188:8080
195.250.143.182:80
88.247.53.159:443
186.223.86.136:443
46.32.229.152:8080
185.192.75.240:443
91.117.31.181:80
85.100.122.211:80
98.178.241.106:80
58.93.151.148:80
88.247.26.78:80
95.130.37.244:443
195.201.56.70:8080
37.46.129.215:8080
181.143.101.18:8080
175.127.140.68:80
41.185.29.128:8080
186.147.245.204:80
70.45.30.28:80
109.236.109.159:8080
139.59.12.63:8080
158.69.167.246:8080
122.176.116.57:443
177.144.130.105:443
188.251.213.180:443
184.162.115.11:443
91.117.131.122:80
61.221.152.140:80
203.153.216.178:7080
183.87.40.21:8080
98.15.140.226:80
60.151.66.216:443
183.82.123.60:443
50.116.78.109:8080
77.74.78.80:443
144.76.56.36:8080
190.171.153.139:80
162.154.175.215:80
192.241.220.183:8080
95.216.207.86:7080
160.119.153.20:80
110.2.118.164:80
110.142.161.90:80
190.5.162.204:80
60.130.173.117:80
88.248.140.80:80
181.167.35.84:80
187.177.155.123:990
196.6.119.137:80
81.82.247.216:80
160.226.171.255:443
211.229.116.130:80
172.104.70.207:8080
178.62.75.204:8080
41.77.74.214:443
95.66.182.136:80
183.131.156.10:7080
82.146.55.23:7080
72.176.87.136:80
187.72.47.161:443
200.82.88.254:80
156.155.163.232:80
1.217.126.11:443
157.7.164.178:8081
61.204.119.188:443
82.79.244.92:80
125.209.114.180:443
162.144.46.90:8080
51.77.113.97:8080
186.84.173.136:8080
182.71.222.187:80
212.112.113.235:80
153.137.36.142:80
144.139.91.187:80
81.214.142.115:80
85.109.190.235:443
70.60.238.62:80
37.70.131.107:80
41.215.79.182:80
75.86.6.174:80
105.209.235.113:8080
182.176.116.139:995
212.129.14.27:8080
180.33.71.88:80
78.188.33.71:80
179.5.118.12:8080
177.103.240.93:80
125.230.43.72:80
80.211.32.88:8080
59.135.126.129:443
150.246.246.238:80
182.187.137.199:8080
1.221.254.82:80
72.27.212.209:8080
50.63.13.135:8080
91.83.93.103:443
220.247.70.174:80
154.73.137.131:80
112.186.195.176:80
175.181.7.188:80
203.124.57.50:80
50.251.171.165:80
210.213.85.43:8080
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exewmpformat.exewmpformat.exepid process 1424 72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe 836 72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe 1676 wmpformat.exe 1844 wmpformat.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exewmpformat.exedescription pid process target process PID 1424 wrote to memory of 836 1424 72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe 72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe PID 1676 wrote to memory of 1844 1676 wmpformat.exe wmpformat.exe -
Suspicious behavior: EmotetMutantsSpam 2 IoCs
Processes:
72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exewmpformat.exepid process 836 72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe 1844 wmpformat.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exepid process 836 72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
wmpformat.exepid process 1844 wmpformat.exe -
Drops file in System32 directory 2 IoCs
Processes:
72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exewmpformat.exedescription ioc process File renamed C:\Users\Admin\AppData\Local\Temp\72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe => C:\Windows\SysWOW64\wmpformat.exe 72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wmpformat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe"C:\Users\Admin\AppData\Local\Temp\72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\72b2cf90e8702b465d359072eeb0c94448316b611bd8fd1aa9a75494f8dc2b14.exe--2edfac962⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: RenamesItself
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmpformat.exe"C:\Windows\SysWOW64\wmpformat.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wmpformat.exe--63c7e5c72⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: EnumeratesProcesses
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/836-1-0x0000000000260000-0x0000000000277000-memory.dmpFilesize
92KB
-
memory/836-2-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB
-
memory/1424-0-0x0000000000270000-0x0000000000287000-memory.dmpFilesize
92KB
-
memory/1676-3-0x0000000000830000-0x0000000000847000-memory.dmpFilesize
92KB
-
memory/1844-4-0x00000000008E0000-0x00000000008F7000-memory.dmpFilesize
92KB
-
memory/1844-5-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB