Analysis
-
max time kernel
144s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
14-03-2022 15:59
Static task
static1
Behavioral task
behavioral1
Sample
task1.exe
Resource
win10v2004-en-20220113
General
-
Target
task1.exe
-
Size
188KB
-
MD5
2ba73d2d47cf2d388446b781613b7eff
-
SHA1
c75c7eb4814835388881d1b4c2db67e64a023e1e
-
SHA256
06c6442d5bb110140ac1cdbcf1be52388441b9a0750d59b743acc6b52d19582b
-
SHA512
667ddc16765d8c3c3596bb734174862db1f2ac24037c361a2e37ec9824c35a8926728400025d62c62c361b1b1e1a9d1e3b4c38c2c5989eee832e083481e50caa
Malware Config
Extracted
emotet
Epoch2
74.219.172.26:80
134.209.36.254:8080
104.156.59.7:8080
120.138.30.150:8080
194.187.133.160:443
104.236.246.93:8080
74.208.45.104:8080
78.187.156.31:80
187.161.206.24:80
94.23.216.33:80
172.91.208.86:80
91.211.88.52:7080
50.91.114.38:80
200.123.150.89:443
121.124.124.40:7080
62.75.141.82:80
5.196.74.210:8080
24.137.76.62:80
85.105.205.77:8080
139.130.242.43:80
82.225.49.121:80
110.145.77.103:80
195.251.213.56:80
46.105.131.79:8080
87.106.136.232:8080
75.139.38.211:80
124.41.215.226:80
203.153.216.189:7080
162.241.242.173:8080
219.74.18.66:443
174.45.13.118:80
68.188.112.97:80
200.114.213.233:8080
213.196.135.145:80
61.92.17.12:80
61.19.246.238:443
219.75.128.166:80
120.150.60.189:80
123.176.25.234:80
1.221.254.82:80
137.119.36.33:80
94.23.237.171:443
74.120.55.163:80
62.30.7.67:443
104.131.11.150:443
139.59.67.118:443
209.141.54.221:8080
79.137.83.50:443
84.39.182.7:80
97.82.79.83:80
87.106.139.101:8080
94.1.108.190:443
37.187.72.193:8080
139.162.108.71:8080
93.147.212.206:80
74.134.41.124:80
103.86.49.11:8080
75.80.124.4:80
109.74.5.95:8080
153.232.188.106:80
168.235.67.138:7080
50.35.17.13:80
42.200.107.142:80
82.80.155.43:80
78.24.219.147:8080
24.43.99.75:80
107.5.122.110:80
156.155.166.221:80
83.169.36.251:8080
47.144.21.12:443
79.98.24.39:8080
181.169.34.190:80
139.59.60.244:8080
85.152.162.105:80
185.94.252.104:443
110.5.16.198:80
174.102.48.180:443
140.186.212.146:80
95.179.229.244:8080
104.32.141.43:80
169.239.182.217:8080
121.7.127.163:80
94.200.114.161:80
201.173.217.124:443
104.131.44.150:8080
137.59.187.107:8080
5.39.91.110:7080
203.117.253.142:80
157.245.99.39:8080
176.111.60.55:8080
95.213.236.64:8080
220.245.198.194:80
37.139.21.175:8080
89.216.122.92:80
139.99.158.11:443
24.179.13.119:80
188.219.31.12:80
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2172-130-0x0000000002240000-0x0000000002252000-memory.dmp emotet behavioral1/memory/2172-134-0x0000000000540000-0x0000000000550000-memory.dmp emotet behavioral1/memory/2172-137-0x0000000000530000-0x000000000053F000-memory.dmp emotet -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
task1.exemsedge.exemsedge.exepid process 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 896 msedge.exe 896 msedge.exe 3208 msedge.exe 3208 msedge.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe 2172 task1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3208 msedge.exe 3208 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 3020 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3020 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
msedge.exepid process 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
task1.exepid process 2172 task1.exe 2172 task1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3208 wrote to memory of 1432 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 1432 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 4136 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 896 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 896 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe PID 3208 wrote to memory of 2056 3208 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\task1.exe"C:\Users\Admin\AppData\Local\Temp\task1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2172
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x320 0x4fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:?launchContext1=Microsoft.Windows.Cortana_cw5n1h2txyewy&url=https%3A%2F%2Fwww.bing.com%2Fsearch%3Fq%3Dtask1%26form%3DWNSGPH%26qs%3DSW%26cvid%3Db8c631b6d34041f08d4d4f6ce54b027c%26pq%3Dtask1%26cc%3DUS%26setlang%3Den-US%26nclid%3DAC132211E844C53C821E601A23766E16%26ts%3D1643418612710%26nclidts%3D1643418612%26tsms%3D7101⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xb0,0x104,0x7ffc85f746f8,0x7ffc85f74708,0x7ffc85f747182⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14045904640327396730,48871416298266658,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,14045904640327396730,48871416298266658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,14045904640327396730,48871416298266658,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14045904640327396730,48871416298266658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14045904640327396730,48871416298266658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:12⤵PID:4024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask1⤵PID:4256
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e