Analysis
-
max time kernel
114s -
max time network
142s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10/07/2020, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
wlandlg.bin.exe
Resource
win7
General
-
Target
wlandlg.bin.exe
-
Size
692KB
-
MD5
2709b1cb95453bfd6a2570ba336cd4b3
-
SHA1
15c0cc33f2e6cf69ecb8aae335c61b5147909d1b
-
SHA256
b74507b01e19be7d2be37748643fa21868953c384f01c4ebda0f3c675b347736
-
SHA512
dad56e7be4373411efc0b35395ba522db5dce7ef696136bf2835f60d29ab2844e934131813add7f3247c7d5adfe6cbed7689a207ef0e10198803cb7745f71aa1
Malware Config
Extracted
emotet
181.120.79.227:80
91.236.4.234:443
190.17.195.202:80
104.131.103.37:8080
190.147.137.153:443
186.3.232.68:80
190.163.1.31:8080
143.0.87.101:80
70.32.115.157:8080
177.66.190.130:80
82.196.15.205:8080
77.90.136.129:8080
175.114.178.83:443
46.28.111.142:7080
94.176.234.118:443
114.109.179.60:80
70.32.84.74:8080
172.104.169.32:8080
113.190.254.245:80
81.169.202.3:443
5.196.35.138:7080
89.32.150.160:8080
186.250.52.226:8080
187.51.47.26:80
104.236.161.64:8080
68.183.190.199:8080
80.249.176.206:80
12.162.84.2:8080
207.255.37.143:80
170.81.48.2:80
187.162.248.237:80
212.71.237.140:8080
190.229.148.144:80
177.139.131.143:443
192.241.143.52:8080
201.213.32.59:80
185.94.252.27:443
149.62.173.247:8080
61.92.159.208:8080
221.133.46.86:443
104.131.41.185:8080
192.241.146.84:8080
72.47.248.48:7080
45.161.242.102:80
190.194.242.254:443
204.225.249.100:7080
178.79.163.131:8080
219.92.13.25:80
185.94.252.13:443
190.6.193.152:8080
185.94.252.12:80
184.57.130.8:80
202.62.39.111:80
189.218.165.63:80
111.67.12.221:8080
177.72.13.80:80
190.181.235.46:80
181.31.211.181:80
2.47.112.152:80
217.13.106.14:8080
87.106.46.107:8080
46.214.11.172:80
77.55.211.77:8080
83.169.21.32:7080
203.25.159.3:8080
50.28.51.143:8080
Signatures
-
Suspicious behavior: EmotetMutantsSpam 2 IoCs
pid Process 2536 wlandlg.bin.exe 2812 offfilt.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2536 wlandlg.bin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2812 2536 wlandlg.bin.exe 68 PID 2536 wrote to memory of 2812 2536 wlandlg.bin.exe 68 PID 2536 wrote to memory of 2812 2536 wlandlg.bin.exe 68 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2812 offfilt.exe 2812 offfilt.exe 2812 offfilt.exe 2812 offfilt.exe 2812 offfilt.exe 2812 offfilt.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2536 wlandlg.bin.exe 2536 wlandlg.bin.exe 2812 offfilt.exe 2812 offfilt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wlandlg.bin.exe"C:\Users\Admin\AppData\Local\Temp\wlandlg.bin.exe"1⤵
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Windows\SysWOW64\offfilt\offfilt.exe"C:\Windows\SysWOW64\offfilt\offfilt.exe"2⤵
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2812
-