Analysis
-
max time kernel
129s -
max time network
143s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 10:41
Static task
static1
Behavioral task
behavioral1
Sample
iscsied.bin.exe
Resource
win7
General
-
Target
iscsied.bin.exe
-
Size
692KB
-
MD5
cdedba9345f7443d417373a581f0eb96
-
SHA1
e376629c1a6fcc48a9478e90c59153a634f1cc12
-
SHA256
ce8679260773363b9b36e64d7624af8ad5af6f631a3813f789245ac9a06db390
-
SHA512
f8a99ad2c77339b2b0930b6c24823cb793c3ac5dcd0b2336c9ed7265296c28586a335903bec195665e05ae3b1370abb1be05df38135269fae43bc577f84679d1
Malware Config
Extracted
emotet
181.230.65.232:80
77.74.78.80:443
192.241.220.183:8080
195.201.56.70:8080
125.63.106.22:80
203.153.216.178:7080
139.59.12.63:8080
190.251.235.239:80
14.99.112.138:80
192.163.221.191:8080
46.49.124.53:80
81.214.253.80:443
46.32.229.152:8080
74.208.173.91:8080
163.172.107.70:8080
37.46.129.215:8080
212.112.113.235:80
50.116.78.109:8080
113.161.148.81:80
78.188.170.128:80
190.171.153.139:80
41.169.20.147:8090
113.160.180.109:80
192.210.217.94:8080
51.38.201.19:7080
37.208.106.146:8080
110.44.113.2:8080
185.142.236.163:443
157.7.164.178:8081
91.83.93.103:443
211.20.154.102:80
177.0.241.28:80
179.5.118.12:80
88.235.222.255:80
203.153.216.182:7080
178.33.167.120:8080
115.79.195.246:80
190.55.233.156:80
80.211.32.88:8080
41.185.29.128:8080
188.0.135.237:80
220.128.125.18:80
181.164.110.7:80
45.118.136.92:8080
82.165.15.188:8080
37.70.131.107:80
75.127.14.170:8080
140.207.113.106:443
Signatures
-
Suspicious behavior: EmotetMutantsSpam 2 IoCs
pid Process 1612 iscsied.bin.exe 1784 Windows.Media.Import.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1612 iscsied.bin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1784 1612 iscsied.bin.exe 68 PID 1612 wrote to memory of 1784 1612 iscsied.bin.exe 68 PID 1612 wrote to memory of 1784 1612 iscsied.bin.exe 68 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1784 Windows.Media.Import.exe 1784 Windows.Media.Import.exe 1784 Windows.Media.Import.exe 1784 Windows.Media.Import.exe 1784 Windows.Media.Import.exe 1784 Windows.Media.Import.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1612 iscsied.bin.exe 1612 iscsied.bin.exe 1784 Windows.Media.Import.exe 1784 Windows.Media.Import.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\iscsied.bin.exe"C:\Users\Admin\AppData\Local\Temp\iscsied.bin.exe"1⤵
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\Windows.Media.Import\Windows.Media.Import.exe"C:\Windows\SysWOW64\Windows.Media.Import\Windows.Media.Import.exe"2⤵
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1784
-