6271467933302784.zip

General
Target

381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe

Filesize

474KB

Completed

16-09-2021 11:59

Score
10/10
MD5

604a044f20590d8486489d2b736e47fa

SHA1

8152a4a20292751f381b4a6d0bbce1c2f04739af

SHA256

381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580

Malware Config

Extracted

Family emotet
Botnet Epoch2
C2

124.240.198.66:80

186.75.241.230:80

181.143.194.138:443

45.79.188.67:8080

77.237.248.136:8080

185.142.236.163:443

63.142.253.122:8080

178.254.6.27:7080

190.211.207.11:443

78.188.105.159:21

182.176.106.43:995

178.79.161.166:443

206.189.98.125:8080

87.230.19.21:8080

80.11.163.139:443

101.187.237.217:20

190.18.146.70:80

86.98.25.30:53

92.222.125.16:7080

186.4.172.5:443

169.239.182.217:8080

189.209.217.49:80

104.236.246.93:8080

190.228.72.244:53

88.247.163.44:80

45.123.3.54:443

91.205.215.66:8080

190.106.97.230:443

199.19.237.192:80

186.4.172.5:20

94.205.247.10:80

104.131.11.150:8080

144.139.247.220:80

119.15.153.237:80

173.212.203.26:8080

136.243.177.26:8080

5.196.74.210:8080

85.104.59.244:20

190.186.203.55:80

187.144.189.58:50000

78.24.219.147:8080

186.4.172.5:8080

46.105.131.87:80

149.167.86.174:990

222.214.218.192:8080

88.156.97.210:80

185.94.252.13:443

190.226.44.20:21

217.145.83.44:80

80.11.163.139:21

rsa_pubkey.plain
Signatures 7

Filter: none

Discovery
  • Emotet

    Description

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory
    gesturetlb.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookiesgesturetlb.exe
    File opened for modificationC:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5gesturetlb.exe
    File opened for modificationC:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.datgesturetlb.exe
    File opened for modificationC:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5gesturetlb.exe
    File opened for modificationC:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IEgesturetlb.exe
  • Enumerates physical storage devices

    Description

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    TTPs

    System Information Discovery
  • Modifies data under HKEY_USERS
    gesturetlb.exe

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefixgesturetlb.exe
    Set value (str)\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:"gesturetlb.exe
    Set value (str)\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:"gesturetlb.exe
  • Suspicious behavior: EnumeratesProcesses
    gesturetlb.exe

    Reported IOCs

    pidprocess
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
    3844gesturetlb.exe
  • Suspicious behavior: RenamesItself
    381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe

    Reported IOCs

    pidprocess
    1020381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe
  • Suspicious use of WriteProcessMemory
    381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exegesturetlb.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 3908 wrote to memory of 10203908381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe
    PID 3908 wrote to memory of 10203908381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe
    PID 3908 wrote to memory of 10203908381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe
    PID 3200 wrote to memory of 38443200gesturetlb.exegesturetlb.exe
    PID 3200 wrote to memory of 38443200gesturetlb.exegesturetlb.exe
    PID 3200 wrote to memory of 38443200gesturetlb.exegesturetlb.exe
Processes 4
  • C:\Users\Admin\AppData\Local\Temp\381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe
    "C:\Users\Admin\AppData\Local\Temp\381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe"
    Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\AppData\Local\Temp\381fe5b3c4d640baf1495ad7f3e111af78c88df250895d87979834f952953580.exe
      --f8e7cfe6
      Suspicious behavior: RenamesItself
      PID:1020
  • C:\Windows\SysWOW64\gesturetlb.exe
    "C:\Windows\SysWOW64\gesturetlb.exe"
    Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Windows\SysWOW64\gesturetlb.exe
      --b26f6013
      Drops file in System32 directory
      Modifies data under HKEY_USERS
      Suspicious behavior: EnumeratesProcesses
      PID:3844
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation
                        Replay Monitor
                        00:00 00:00
                        Downloads
                        • memory/1020-117-0x0000000000000000-mapping.dmp

                        • memory/1020-118-0x0000000000400000-0x0000000000478000-memory.dmp

                        • memory/3844-121-0x0000000000400000-0x0000000000478000-memory.dmp

                        • memory/3844-119-0x0000000000000000-mapping.dmp

                        • memory/3844-120-0x0000000000530000-0x00000000005DE000-memory.dmp

                        • memory/3908-116-0x0000000000400000-0x0000000000478000-memory.dmp

                        • memory/3908-115-0x00000000029F0000-0x0000000002A05000-memory.dmp