Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 08:01
Static task
static1
Behavioral task
behavioral1
Sample
1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe
Resource
win10v2004-en-20220113
General
-
Target
1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe
-
Size
132KB
-
MD5
9987adb305c3e989d368b913ea35c978
-
SHA1
f3c2d096888b20e8e9000bf5eb0738d96462693a
-
SHA256
1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca
-
SHA512
c3cab64f6f676972b81d54a243500caa12602a397a9dd4deb56e310bc0cfccefeca87b392ad19c5c249259f9d3d0e08f34df1dfe63642e61bce7c25d72dc2de7
Malware Config
Extracted
emotet
Epoch2
81.109.227.123:80
82.15.36.209:443
142.4.198.249:7080
162.144.119.216:8080
142.93.88.16:443
31.12.67.62:7080
91.83.93.103:7080
178.152.78.149:20
104.131.208.175:8080
136.243.177.26:8080
206.189.98.125:8080
178.79.161.166:443
195.242.117.231:8080
187.163.222.244:465
186.144.64.31:53
104.236.99.225:8080
71.244.60.230:8080
91.205.215.66:8080
212.71.234.16:8080
190.25.255.98:443
69.45.19.145:8080
188.166.253.46:8080
91.74.62.86:8090
167.114.210.191:8080
186.4.234.27:443
190.53.135.159:21
222.214.218.136:4143
80.1.76.46:20
182.176.132.213:8090
94.76.200.114:8080
87.230.19.21:8080
178.62.37.188:443
31.172.240.91:8080
200.85.46.122:80
159.65.25.128:8080
190.145.67.134:8090
187.163.180.243:22
86.139.40.19:8080
60.48.253.12:20
78.24.219.147:8080
187.146.179.75:993
81.110.245.131:80
47.41.213.2:22
90.207.51.77:80
181.129.30.82:80
45.123.3.54:443
190.72.136.214:465
46.101.142.115:8080
84.241.10.111:53
182.176.94.236:20
190.25.255.98:80
187.189.195.208:8443
120.150.236.64:20
147.135.210.39:8080
186.31.189.232:143
138.201.140.110:8080
190.128.26.2:80
169.239.182.217:8080
95.128.43.213:8080
179.14.2.75:80
190.25.255.98:143
87.106.136.232:8080
77.56.253.112:80
179.14.2.75:21
144.139.247.220:80
217.13.106.160:7080
125.99.106.226:80
50.31.0.160:8080
41.220.119.246:80
186.19.202.88:21
190.97.219.241:80
39.61.34.254:7080
85.104.59.244:20
174.136.14.100:8080
222.214.218.192:8080
201.199.89.223:8443
62.75.187.192:8080
59.103.164.174:80
66.84.11.168:8080
175.100.138.82:22
187.225.213.90:20
182.176.94.236:21
24.139.205.186:8080
201.238.152.20:465
189.209.217.49:80
177.246.193.139:20
104.236.246.93:8080
92.154.101.154:50000
216.98.148.156:8080
78.186.5.109:443
50.99.132.7:465
104.131.11.150:8080
211.63.71.72:8080
177.242.214.30:80
87.106.139.101:8080
78.188.7.213:8090
64.13.225.150:8080
119.155.153.14:21
211.248.17.209:443
201.220.152.101:80
213.14.166.152:990
117.218.17.6:990
173.212.203.26:8080
186.4.167.166:80
46.105.131.87:80
45.33.49.124:443
179.32.19.219:22
162.243.125.212:8080
182.176.94.236:80
75.127.14.170:8080
181.189.213.231:465
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
waspower.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat waspower.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
waspower.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-ae-2f-66-53-42 waspower.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections waspower.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" waspower.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AD5BD91F-A825-4690-AF65-6FEECC9D53BD}\WpadNetworkName = "Network 3" waspower.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AD5BD91F-A825-4690-AF65-6FEECC9D53BD}\WpadDecisionTime = f05e6e7a4a17d801 waspower.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings waspower.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 waspower.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AD5BD91F-A825-4690-AF65-6FEECC9D53BD} waspower.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AD5BD91F-A825-4690-AF65-6FEECC9D53BD}\WpadDecisionReason = "1" waspower.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AD5BD91F-A825-4690-AF65-6FEECC9D53BD}\WpadDecision = "0" waspower.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AD5BD91F-A825-4690-AF65-6FEECC9D53BD}\f6-ae-2f-66-53-42 waspower.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-ae-2f-66-53-42\WpadDecisionTime = f05e6e7a4a17d801 waspower.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-ae-2f-66-53-42\WpadDecision = "0" waspower.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 waspower.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad waspower.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 waspower.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" waspower.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-ae-2f-66-53-42\WpadDecisionReason = "1" waspower.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix waspower.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" waspower.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings waspower.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
waspower.exepid process 1396 waspower.exe 1396 waspower.exe 1396 waspower.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exepid process 1680 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exewaspower.exewaspower.exepid process 836 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe 1680 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe 380 waspower.exe 1396 waspower.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exewaspower.exedescription pid process target process PID 836 wrote to memory of 1680 836 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe PID 836 wrote to memory of 1680 836 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe PID 836 wrote to memory of 1680 836 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe PID 836 wrote to memory of 1680 836 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe 1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe PID 380 wrote to memory of 1396 380 waspower.exe waspower.exe PID 380 wrote to memory of 1396 380 waspower.exe waspower.exe PID 380 wrote to memory of 1396 380 waspower.exe waspower.exe PID 380 wrote to memory of 1396 380 waspower.exe waspower.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe"C:\Users\Admin\AppData\Local\Temp\1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1f4259e2b808cd00fc825f0e39a2b22ff4aea6caa5175f1e4567dba0bf296dca.exe--d090bb492⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\waspower.exe"C:\Windows\SysWOW64\waspower.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\waspower.exe--a44be58e2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/836-55-0x0000000076641000-0x0000000076643000-memory.dmpFilesize
8KB
-
memory/836-56-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB
-
memory/836-57-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1396-62-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/1680-59-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB