Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
11-05-2021 13:10
Static task
static1
Behavioral task
behavioral1
Sample
7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe
Resource
win7v20210410
General
-
Target
7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe
-
Size
368KB
-
MD5
5d5aabcfacffe957d4a27c89f5d9263b
-
SHA1
a5656b7815bd3e5bbecc2cb0e1f1a5eec34bca32
-
SHA256
7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952
-
SHA512
8d1d8a8b83ce5b3526aaf9bd457fd2fcbe0d9372c780b1c715fe5d8bf1db845eec770ad597b60bec42cd0363483e4589b21ea8c7c35024b619f909bfd0b13e8c
Malware Config
Extracted
emotet
Epoch3
118.167.155.233:80
110.37.226.196:443
178.33.167.120:8080
124.150.175.133:443
87.252.100.28:80
75.127.14.170:8080
190.247.9.40:443
181.225.24.251:80
45.55.179.121:8080
154.120.227.190:443
91.83.93.103:443
188.251.213.180:443
211.20.154.102:443
186.80.169.128:80
192.210.217.94:8080
58.93.151.148:80
178.62.75.204:8080
70.45.30.28:80
14.161.30.33:443
45.118.136.92:8080
158.69.167.246:8080
46.17.6.116:8080
37.70.131.107:80
118.70.185.225:80
103.205.177.228:443
117.2.133.44:443
187.72.47.161:443
201.155.204.151:80
144.139.91.187:80
128.106.71.243:80
113.160.88.86:443
161.18.233.114:80
94.206.82.254:443
190.111.215.3:8080
80.211.32.88:8080
78.188.170.128:80
24.196.13.216:80
85.100.122.211:80
50.116.78.109:8080
154.120.227.190:20
183.131.156.10:7080
190.17.94.108:443
157.7.164.178:8081
132.248.38.158:80
116.90.228.177:80
198.211.121.27:8080
125.63.106.22:80
50.63.13.135:8080
42.200.178.117:80
88.247.144.128:80
217.12.70.226:80
152.32.78.6:80
163.172.107.70:8080
104.238.80.237:8080
188.251.213.180:8080
105.209.235.113:8080
154.73.137.131:80
186.10.92.114:80
110.44.113.2:8080
78.192.181.26:80
192.241.220.183:8080
95.9.95.101:80
42.51.192.231:8080
187.212.208.8:8080
211.184.5.163:443
212.112.113.235:80
179.5.118.12:80
200.73.228.225:80
185.142.236.163:443
190.157.65.124:465
103.61.109.13:80
133.208.252.149:80
186.223.86.136:443
47.153.183.211:80
195.201.56.70:8080
68.183.18.169:8080
72.10.33.195:8080
104.182.56.131:443
203.153.216.182:7080
31.146.61.34:80
197.94.32.129:20
109.236.109.159:8080
203.153.216.178:7080
89.215.225.15:80
102.22.62.71:80
117.4.120.226:8080
190.171.135.237:80
190.63.7.166:8080
115.65.111.148:80
110.37.226.196:80
172.104.70.207:8080
37.46.129.215:8080
181.176.191.27:443
113.161.148.81:80
116.73.14.186:80
162.144.46.90:8080
190.171.153.139:80
77.74.78.80:443
220.210.163.76:80
180.47.95.158:80
192.163.221.191:8080
82.145.43.153:8080
82.146.55.23:7080
81.214.142.115:80
81.215.14.128:80
220.132.16.114:80
181.196.27.123:80
14.161.6.60:80
220.128.125.18:80
75.86.6.174:80
41.185.29.128:8080
196.6.119.137:80
113.160.180.109:80
122.116.104.238:8080
181.54.182.135:80
177.144.130.105:443
210.6.85.121:80
49.204.68.26:20
88.247.53.159:443
60.117.26.28:80
190.87.164.21:80
82.165.15.188:8080
81.214.253.80:443
5.32.84.54:80
177.0.241.28:80
49.205.182.223:80
37.208.106.146:8080
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ipsmsnap.exepid process 1588 ipsmsnap.exe 1588 ipsmsnap.exe 1588 ipsmsnap.exe 1588 ipsmsnap.exe 1588 ipsmsnap.exe 1588 ipsmsnap.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exepid process 1100 7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exeipsmsnap.exepid process 1100 7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe 1100 7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe 1588 ipsmsnap.exe 1588 ipsmsnap.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exedescription pid process target process PID 1100 wrote to memory of 1588 1100 7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe ipsmsnap.exe PID 1100 wrote to memory of 1588 1100 7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe ipsmsnap.exe PID 1100 wrote to memory of 1588 1100 7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe ipsmsnap.exe PID 1100 wrote to memory of 1588 1100 7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe ipsmsnap.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe"C:\Users\Admin\AppData\Local\Temp\7cbc4b2ce565cdc79e1affd8bb914d7d0446e7de6d5577efbc240c9b54708952.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipsmsnap\ipsmsnap.exe"C:\Windows\SysWOW64\ipsmsnap\ipsmsnap.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1100-59-0x00000000757D1000-0x00000000757D3000-memory.dmpFilesize
8KB
-
memory/1100-60-0x0000000000390000-0x000000000039C000-memory.dmpFilesize
48KB
-
memory/1100-62-0x0000000000380000-0x000000000038E000-memory.dmpFilesize
56KB
-
memory/1588-63-0x0000000000000000-mapping.dmp
-
memory/1588-65-0x00000000003D0000-0x00000000003DC000-memory.dmpFilesize
48KB