Analysis
-
max time kernel
116s -
max time network
129s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 14:12
Static task
static1
Behavioral task
behavioral1
Sample
e090ecdc6c7b118ff7d4b28676ceb0ec.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
e090ecdc6c7b118ff7d4b28676ceb0ec.exe
Resource
win10v20201028
General
-
Target
e090ecdc6c7b118ff7d4b28676ceb0ec.exe
-
Size
568KB
-
MD5
96dd0f6910c80646cd390fc7804c1be8
-
SHA1
6c9a6bf9be087ac60fe35a0c3e7a12dac2c7dbad
-
SHA256
b6dea66efa7692e91417d20e3f6afa4520511d4b42565da9d345297c38d5191b
-
SHA512
3f3235821744c6af3a4fd2bd2477ae5a38a20f30ba4cacb26ae5a9ce84bdc127364bbe7d10b71bf83dbc050c8b895d944e06ced412a6f4805151433a6e106667
Malware Config
Extracted
emotet
Epoch2
88.153.35.32:80
107.170.146.252:8080
173.212.214.235:7080
167.114.153.111:8080
202.141.243.254:443
75.143.247.51:80
85.105.111.166:80
216.139.123.119:80
113.61.66.94:80
162.241.140.129:8080
190.12.119.180:443
2.58.16.89:8080
91.211.88.52:7080
93.147.212.206:80
71.15.245.148:8080
157.245.99.39:8080
27.114.9.93:80
50.91.114.38:80
174.106.122.139:80
47.36.140.164:80
139.162.60.124:8080
209.54.13.14:80
217.20.166.178:7080
185.94.252.104:443
72.186.136.247:443
172.86.188.251:8080
41.185.28.84:8080
87.106.139.101:8080
89.216.122.92:80
108.46.29.236:80
184.180.181.202:80
173.63.222.65:80
120.150.60.189:80
62.30.7.67:443
139.99.158.11:443
220.245.198.194:80
138.68.87.218:443
201.241.127.190:80
186.74.215.34:80
190.162.215.233:80
24.178.90.49:80
89.121.205.18:80
5.39.91.110:7080
59.125.219.109:443
182.208.30.18:443
123.176.25.234:80
24.137.76.62:80
74.208.45.104:8080
194.187.133.160:443
37.179.204.33:80
194.4.58.192:7080
95.9.5.93:80
67.170.250.203:443
61.33.119.226:443
96.245.227.43:80
68.115.186.26:80
190.108.228.27:443
112.185.64.233:80
176.111.60.55:8080
91.146.156.228:80
190.240.194.77:443
115.94.207.99:443
62.171.142.179:8080
134.209.144.106:443
168.235.67.138:7080
124.41.215.226:80
172.104.97.173:8080
202.134.4.216:8080
94.200.114.161:80
67.163.161.107:80
61.76.222.210:80
97.82.79.83:80
74.214.230.200:80
46.105.131.79:8080
78.188.106.53:443
186.70.56.94:443
37.187.72.193:8080
142.112.10.95:20
120.150.218.241:443
50.245.107.73:443
190.29.166.0:80
123.142.37.166:80
110.145.77.103:80
61.19.246.238:443
218.147.193.146:80
94.230.70.6:80
154.91.33.137:443
104.131.11.150:443
95.213.236.64:8080
49.50.209.131:80
187.161.206.24:80
37.139.21.175:8080
121.124.124.40:7080
200.116.145.225:443
24.230.141.169:80
194.190.67.75:80
209.141.54.221:7080
137.59.187.107:8080
217.123.207.149:80
24.133.106.23:80
79.137.83.50:443
24.179.13.119:80
202.134.4.211:8080
78.24.219.147:8080
76.175.162.101:80
121.7.31.214:80
62.75.141.82:80
109.74.5.95:8080
75.188.96.231:80
176.113.52.6:443
50.35.17.13:80
118.83.154.64:443
110.142.236.207:80
188.219.31.12:80
72.143.73.234:443
102.182.93.220:80
66.76.12.94:8080
103.86.49.11:8080
190.164.104.62:80
203.153.216.189:7080
119.59.116.21:8080
172.105.13.66:443
94.23.237.171:443
49.3.224.99:8080
139.59.60.244:8080
172.91.208.86:80
Signatures
-
Emotet Payload 1 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral1/memory/1580-3-0x00000000003D0000-0x00000000003E0000-memory.dmp emotet -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
e090ecdc6c7b118ff7d4b28676ceb0ec.exepid process 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e090ecdc6c7b118ff7d4b28676ceb0ec.exepid process 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e090ecdc6c7b118ff7d4b28676ceb0ec.exedescription pid process target process PID 1580 wrote to memory of 1492 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe splwow64.exe PID 1580 wrote to memory of 1492 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe splwow64.exe PID 1580 wrote to memory of 1492 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe splwow64.exe PID 1580 wrote to memory of 1492 1580 e090ecdc6c7b118ff7d4b28676ceb0ec.exe splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e090ecdc6c7b118ff7d4b28676ceb0ec.exe"C:\Users\Admin\AppData\Local\Temp\e090ecdc6c7b118ff7d4b28676ceb0ec.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵