Analysis

  • max time kernel
    4294200s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    02-03-2022 04:10

General

  • Target

    95f41e9b8a4f4e066d9973936f9197fc1ef50c8e3349809c1c95c21b5cc361a5.exe

  • Size

    870KB

  • MD5

    d3b829a5765f6f06d86a2a3f1278b9e6

  • SHA1

    66e27d00dff7265aeba5f6bbafe2b39b91ff2db2

  • SHA256

    95f41e9b8a4f4e066d9973936f9197fc1ef50c8e3349809c1c95c21b5cc361a5

  • SHA512

    a803ee8441492689196d1d38b559bb37b680451cd865de01f8a34d84f90c305d8da27bec0d55d84f2e223ad835b201936b2c0909d1640ce5de4a2ad83ea7b74d

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

184.180.181.202:80

169.50.76.149:8080

162.241.140.129:8080

104.131.123.136:443

194.187.133.160:443

71.15.245.148:8080

37.139.21.175:8080

104.131.11.150:443

118.83.154.64:443

24.137.76.62:80

79.137.83.50:443

69.206.132.149:80

110.142.236.207:80

123.176.25.234:80

120.150.60.189:80

209.54.13.14:80

95.213.236.64:8080

209.141.54.221:8080

96.245.227.43:80

87.106.139.101:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet Payload 5 IoCs

    Detects Emotet payload in memory.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95f41e9b8a4f4e066d9973936f9197fc1ef50c8e3349809c1c95c21b5cc361a5.exe
    "C:\Users\Admin\AppData\Local\Temp\95f41e9b8a4f4e066d9973936f9197fc1ef50c8e3349809c1c95c21b5cc361a5.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\KBDGR1\netprofm.exe
      "C:\Windows\SysWOW64\KBDGR1\netprofm.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\KBDGR1\netprofm.exe

    MD5

    d3b829a5765f6f06d86a2a3f1278b9e6

    SHA1

    66e27d00dff7265aeba5f6bbafe2b39b91ff2db2

    SHA256

    95f41e9b8a4f4e066d9973936f9197fc1ef50c8e3349809c1c95c21b5cc361a5

    SHA512

    a803ee8441492689196d1d38b559bb37b680451cd865de01f8a34d84f90c305d8da27bec0d55d84f2e223ad835b201936b2c0909d1640ce5de4a2ad83ea7b74d

  • memory/884-64-0x0000000001DC0000-0x0000000001DD8000-memory.dmp

    Filesize

    96KB

  • memory/884-67-0x0000000001DE0000-0x0000000001DF7000-memory.dmp

    Filesize

    92KB

  • memory/1652-54-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB

  • memory/1652-55-0x0000000000320000-0x0000000000338000-memory.dmp

    Filesize

    96KB

  • memory/1652-58-0x00000000003D0000-0x00000000003E7000-memory.dmp

    Filesize

    92KB

  • memory/1652-62-0x0000000000300000-0x0000000000316000-memory.dmp

    Filesize

    88KB