Analysis
-
max time kernel
64s -
max time network
129s -
platform
windows7_x64 -
resource
win7 -
submitted
10/07/2020, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
wlandlg.bin.exe
Resource
win7
General
-
Target
wlandlg.bin.exe
-
Size
692KB
-
MD5
2709b1cb95453bfd6a2570ba336cd4b3
-
SHA1
15c0cc33f2e6cf69ecb8aae335c61b5147909d1b
-
SHA256
b74507b01e19be7d2be37748643fa21868953c384f01c4ebda0f3c675b347736
-
SHA512
dad56e7be4373411efc0b35395ba522db5dce7ef696136bf2835f60d29ab2844e934131813add7f3247c7d5adfe6cbed7689a207ef0e10198803cb7745f71aa1
Malware Config
Extracted
emotet
181.120.79.227:80
91.236.4.234:443
190.17.195.202:80
104.131.103.37:8080
190.147.137.153:443
186.3.232.68:80
190.163.1.31:8080
143.0.87.101:80
70.32.115.157:8080
177.66.190.130:80
82.196.15.205:8080
77.90.136.129:8080
175.114.178.83:443
46.28.111.142:7080
94.176.234.118:443
114.109.179.60:80
70.32.84.74:8080
172.104.169.32:8080
113.190.254.245:80
81.169.202.3:443
5.196.35.138:7080
89.32.150.160:8080
186.250.52.226:8080
187.51.47.26:80
104.236.161.64:8080
68.183.190.199:8080
80.249.176.206:80
12.162.84.2:8080
207.255.37.143:80
170.81.48.2:80
187.162.248.237:80
212.71.237.140:8080
190.229.148.144:80
177.139.131.143:443
192.241.143.52:8080
201.213.32.59:80
185.94.252.27:443
149.62.173.247:8080
61.92.159.208:8080
221.133.46.86:443
104.131.41.185:8080
192.241.146.84:8080
72.47.248.48:7080
45.161.242.102:80
190.194.242.254:443
204.225.249.100:7080
178.79.163.131:8080
219.92.13.25:80
185.94.252.13:443
190.6.193.152:8080
185.94.252.12:80
184.57.130.8:80
202.62.39.111:80
189.218.165.63:80
111.67.12.221:8080
177.72.13.80:80
190.181.235.46:80
181.31.211.181:80
2.47.112.152:80
217.13.106.14:8080
87.106.46.107:8080
46.214.11.172:80
77.55.211.77:8080
83.169.21.32:7080
203.25.159.3:8080
50.28.51.143:8080
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1588 wlandlg.bin.exe 1588 wlandlg.bin.exe 800 xwtpw32.exe 800 xwtpw32.exe -
Suspicious behavior: EmotetMutantsSpam 2 IoCs
pid Process 1588 wlandlg.bin.exe 800 xwtpw32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1588 wlandlg.bin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1588 wrote to memory of 800 1588 wlandlg.bin.exe 24 PID 1588 wrote to memory of 800 1588 wlandlg.bin.exe 24 PID 1588 wrote to memory of 800 1588 wlandlg.bin.exe 24 PID 1588 wrote to memory of 800 1588 wlandlg.bin.exe 24 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 800 xwtpw32.exe 800 xwtpw32.exe 800 xwtpw32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wlandlg.bin.exe"C:\Users\Admin\AppData\Local\Temp\wlandlg.bin.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\xwtpw32\xwtpw32.exe"C:\Windows\SysWOW64\xwtpw32\xwtpw32.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: EnumeratesProcesses
PID:800
-