Analysis
-
max time kernel
1793s -
max time network
1797s -
platform
windows10_x64 -
resource
win10-en -
submitted
16-09-2021 11:50
Behavioral task
behavioral1
Sample
d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe
Resource
win7-en
General
-
Target
d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe
-
Size
474KB
-
MD5
591d2b97f834d2c95667850564e8fbe2
-
SHA1
cf28700496e977e7a4e01c02f20b954a01d89878
-
SHA256
d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790
-
SHA512
1a112bde7e667a85706d67c89663d2ec4e2dfe9bfc2a861f42d0761e633d45c93041363cffa49ed45de249e9c19373c497f8d2900288c80d36a74d14eb80e89c
Malware Config
Extracted
emotet
Epoch2
124.240.198.66:80
186.75.241.230:80
181.143.194.138:443
45.79.188.67:8080
77.237.248.136:8080
185.142.236.163:443
63.142.253.122:8080
178.254.6.27:7080
190.211.207.11:443
78.188.105.159:21
182.176.106.43:995
178.79.161.166:443
206.189.98.125:8080
87.230.19.21:8080
80.11.163.139:443
101.187.237.217:20
190.18.146.70:80
86.98.25.30:53
92.222.125.16:7080
186.4.172.5:443
169.239.182.217:8080
189.209.217.49:80
104.236.246.93:8080
190.228.72.244:53
88.247.163.44:80
45.123.3.54:443
91.205.215.66:8080
190.106.97.230:443
199.19.237.192:80
186.4.172.5:20
94.205.247.10:80
104.131.11.150:8080
144.139.247.220:80
119.15.153.237:80
173.212.203.26:8080
136.243.177.26:8080
5.196.74.210:8080
85.104.59.244:20
190.186.203.55:80
187.144.189.58:50000
78.24.219.147:8080
186.4.172.5:8080
46.105.131.87:80
149.167.86.174:990
222.214.218.192:8080
88.156.97.210:80
185.94.252.13:443
190.226.44.20:21
217.145.83.44:80
80.11.163.139:21
138.201.140.110:8080
190.53.135.159:21
31.172.240.91:8080
92.222.216.44:8080
87.106.139.101:8080
159.65.25.128:8080
31.12.67.62:7080
211.63.71.72:8080
179.32.19.219:22
92.233.128.13:143
87.106.136.232:8080
182.176.132.213:8090
37.157.194.134:443
181.143.53.227:21
188.166.253.46:8080
41.220.119.246:80
95.128.43.213:8080
103.97.95.218:143
201.251.43.69:8080
190.108.228.48:990
149.202.153.252:8080
24.51.106.145:21
182.76.6.2:8080
85.106.1.166:50000
62.75.187.192:8080
142.44.162.209:8080
45.33.49.124:443
27.147.163.188:8080
217.160.182.191:8080
212.71.234.16:8080
83.136.245.190:8080
47.41.213.2:22
103.255.150.84:80
200.71.148.138:8080
190.145.67.134:8090
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
readandnlsdl.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat readandnlsdl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 readandnlsdl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE readandnlsdl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies readandnlsdl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 readandnlsdl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
readandnlsdl.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix readandnlsdl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" readandnlsdl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" readandnlsdl.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
readandnlsdl.exepid process 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe 1704 readandnlsdl.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exepid process 4000 d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exereadandnlsdl.exedescription pid process target process PID 3940 wrote to memory of 4000 3940 d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe PID 3940 wrote to memory of 4000 3940 d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe PID 3940 wrote to memory of 4000 3940 d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe PID 3696 wrote to memory of 1704 3696 readandnlsdl.exe readandnlsdl.exe PID 3696 wrote to memory of 1704 3696 readandnlsdl.exe readandnlsdl.exe PID 3696 wrote to memory of 1704 3696 readandnlsdl.exe readandnlsdl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe"C:\Users\Admin\AppData\Local\Temp\d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790.exe--35f827d52⤵
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\readandnlsdl.exe"C:\Windows\SysWOW64\readandnlsdl.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\readandnlsdl.exe--5580bae2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1704-119-0x0000000000000000-mapping.dmp
-
memory/1704-120-0x0000000000480000-0x00000000005CA000-memory.dmpFilesize
1.3MB
-
memory/3940-116-0x0000000002420000-0x0000000002435000-memory.dmpFilesize
84KB
-
memory/3940-117-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/4000-118-0x0000000000000000-mapping.dmp