Analysis

  • max time kernel
    128s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    24-11-2020 03:29

General

  • Target

    family.exe

  • Size

    332KB

  • MD5

    f9249b74e2440ac8f6ef8d1c89e318e9

  • SHA1

    876f3e39a3c80ed0920fe078a080315fa69a9d9b

  • SHA256

    26a617b36fce136b57408352b178fb6d0d6dfde977935a4f81673466a8c8d2b6

  • SHA512

    e6ed62c9980d88f966e6604f6b1e555653e20422013c351b1282ac25a212051657787391d3b69bc82e9400e9e57015a9af39e9a8ac767b05d3c3c7d359d82527

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

222.239.249.166:443

217.26.163.82:7080

91.205.173.54:8080

163.172.97.112:8080

103.205.177.229:80

176.58.93.123:80

212.112.113.235:80

201.196.15.79:990

193.34.144.138:8080

172.104.70.207:8080

104.238.80.237:8080

181.44.166.242:80

119.159.150.176:443

5.189.148.98:8080

139.162.185.116:443

190.189.79.73:80

78.46.87.133:8080

192.241.220.183:8080

23.253.207.142:8080

216.70.88.55:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 25 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\family.exe
    "C:\Users\Admin\AppData\Local\Temp\family.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\family.exe
      --5ed55408
      2⤵
      • Suspicious behavior: EmotetMutantsSpam
      • Suspicious behavior: RenamesItself
      PID:1776
  • C:\Windows\SysWOW64\moretitle.exe
    "C:\Windows\SysWOW64\moretitle.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:604
    • C:\Windows\SysWOW64\moretitle.exe
      --d4a55a79
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EmotetMutantsSpam
      • Suspicious behavior: EnumeratesProcesses
      PID:752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/604-4-0x00000000003D0000-0x00000000003E4000-memory.dmp
    Filesize

    80KB

  • memory/752-5-0x0000000000000000-mapping.dmp
  • memory/752-6-0x00000000001D0000-0x00000000001E4000-memory.dmp
    Filesize

    80KB

  • memory/752-7-0x0000000000400000-0x0000000000455000-memory.dmp
    Filesize

    340KB

  • memory/1776-1-0x0000000000000000-mapping.dmp
  • memory/1776-2-0x0000000000250000-0x0000000000264000-memory.dmp
    Filesize

    80KB

  • memory/1776-3-0x0000000000400000-0x0000000000455000-memory.dmp
    Filesize

    340KB

  • memory/1848-0-0x0000000000240000-0x0000000000254000-memory.dmp
    Filesize

    80KB