Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-11-2020 03:29
Static task
static1
Behavioral task
behavioral1
Sample
family.exe
Resource
win7v20201028
General
-
Target
family.exe
-
Size
332KB
-
MD5
f9249b74e2440ac8f6ef8d1c89e318e9
-
SHA1
876f3e39a3c80ed0920fe078a080315fa69a9d9b
-
SHA256
26a617b36fce136b57408352b178fb6d0d6dfde977935a4f81673466a8c8d2b6
-
SHA512
e6ed62c9980d88f966e6604f6b1e555653e20422013c351b1282ac25a212051657787391d3b69bc82e9400e9e57015a9af39e9a8ac767b05d3c3c7d359d82527
Malware Config
Extracted
emotet
Epoch3
222.239.249.166:443
217.26.163.82:7080
91.205.173.54:8080
163.172.97.112:8080
103.205.177.229:80
176.58.93.123:80
212.112.113.235:80
201.196.15.79:990
193.34.144.138:8080
172.104.70.207:8080
104.238.80.237:8080
181.44.166.242:80
119.159.150.176:443
5.189.148.98:8080
139.162.185.116:443
190.189.79.73:80
78.46.87.133:8080
192.241.220.183:8080
23.253.207.142:8080
216.70.88.55:8080
172.245.13.50:8080
162.144.46.90:8080
95.216.207.86:7080
124.150.175.129:8080
124.150.175.133:80
216.75.37.196:8080
181.197.108.171:443
152.169.32.143:8080
187.177.155.123:990
50.116.78.109:8080
95.216.212.157:8080
143.95.101.72:8080
46.105.131.68:8080
192.163.221.191:8080
198.57.217.170:8080
138.197.140.163:8080
46.17.6.116:8080
195.201.56.68:7080
37.59.24.25:8080
191.100.24.201:50000
212.129.14.27:8080
51.38.134.203:8080
113.52.135.33:7080
181.47.235.26:993
177.226.25.78:80
142.93.87.198:8080
83.169.33.157:8080
157.7.164.178:8081
191.82.28.224:80
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
dispiddeploy.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat dispiddeploy.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 dispiddeploy.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE dispiddeploy.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies dispiddeploy.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 dispiddeploy.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
dispiddeploy.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" dispiddeploy.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix dispiddeploy.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" dispiddeploy.exe -
Suspicious behavior: EmotetMutantsSpam 2 IoCs
Processes:
family.exedispiddeploy.exepid process 1840 family.exe 2836 dispiddeploy.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
dispiddeploy.exepid process 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe 2836 dispiddeploy.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
family.exepid process 1840 family.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
family.exedispiddeploy.exedescription pid process target process PID 984 wrote to memory of 1840 984 family.exe family.exe PID 984 wrote to memory of 1840 984 family.exe family.exe PID 984 wrote to memory of 1840 984 family.exe family.exe PID 196 wrote to memory of 2836 196 dispiddeploy.exe dispiddeploy.exe PID 196 wrote to memory of 2836 196 dispiddeploy.exe dispiddeploy.exe PID 196 wrote to memory of 2836 196 dispiddeploy.exe dispiddeploy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\family.exe"C:\Users\Admin\AppData\Local\Temp\family.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\family.exe--5ed554082⤵
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\dispiddeploy.exe"C:\Windows\SysWOW64\dispiddeploy.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\dispiddeploy.exe--3fdc62d62⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EmotetMutantsSpam
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\b36208c2e0ba1c7f0e7f094499ea3452_72727c5d-8d0e-47bb-8579-8067735277ffMD5
d854e5bf32f6eff669679c3a9acd847a
SHA10d43be3bd4161a1cbb329c910fdf62346fa45b20
SHA2565a08f974f0f6e267fb0a7658b1d80e809a3f4f1293a9149238b647f3ed305660
SHA5122dafe095dadaf0536ab48043a05b71900717e49c6a344e3fcd4fa1282db0a46559e67528d541195efaafc77e53d2e69cbe6da46f4ce0fcf827f9d94c4bb48259
-
memory/196-4-0x0000000000D10000-0x0000000000D24000-memory.dmpFilesize
80KB
-
memory/984-0-0x00000000021A0000-0x00000000021B4000-memory.dmpFilesize
80KB
-
memory/1840-1-0x0000000000000000-mapping.dmp
-
memory/1840-2-0x00000000004F0000-0x0000000000504000-memory.dmpFilesize
80KB
-
memory/1840-3-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/2836-5-0x0000000000000000-mapping.dmp
-
memory/2836-7-0x00000000006A0000-0x00000000006B4000-memory.dmpFilesize
80KB
-
memory/2836-8-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB