Resubmissions
22-04-2022 21:47
220422-1nnmyagdf2 10Analysis
-
max time kernel
39s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-04-2022 21:47
Static task
static1
Behavioral task
behavioral1
Sample
VEuIqlISMa.vbs
Resource
win7-20220414-en
General
-
Target
VEuIqlISMa.vbs
-
Size
2KB
-
MD5
e759c57fef989e9230cf121b31e077ec
-
SHA1
434f3d7d49a06606c0fb73e1a2378836f2018338
-
SHA256
bc84d7201f37b0c02ff742f4b8c5d78412796676724fc0af530975dac2fff063
-
SHA512
552b94d3950641f62bcd5be46308fb3e2ab1014b3235c2b4a74d6c4f222fbe71d6991c4cb7325aa5b57f20edbd112c6b89320362ca87ee8c3a24c7f8a605e736
Malware Config
Extracted
emotet
Epoch4
138.201.142.73:8080
138.197.147.101:443
134.195.212.50:7080
104.168.154.79:8080
149.56.131.28:8080
129.232.188.93:443
212.24.98.99:8080
119.193.124.41:7080
45.118.115.99:8080
188.44.20.25:443
103.132.242.26:8080
201.94.166.162:443
1.234.21.73:7080
206.189.28.199:8080
185.8.212.130:7080
82.165.152.127:8080
176.104.106.96:8080
173.212.193.249:8080
167.99.115.35:8080
209.126.98.206:8080
185.157.82.211:8080
212.237.17.99:8080
185.4.135.165:8080
51.91.7.5:8080
187.84.80.182:443
164.68.99.3:8080
107.182.225.142:8080
58.227.42.236:80
103.75.201.2:443
101.50.0.91:8080
216.158.226.206:443
151.106.112.196:8080
45.235.8.30:8080
146.59.226.45:443
45.176.232.124:443
134.122.66.193:8080
51.254.140.238:7080
131.100.24.231:80
167.172.253.162:8080
50.30.40.196:8080
203.114.109.124:443
94.23.45.86:4143
189.126.111.200:7080
160.16.142.56:8080
27.54.89.58:8080
5.9.116.246:8080
46.55.222.11:443
209.97.163.214:443
110.232.117.186:8080
1.234.2.232:8080
153.126.146.25:7080
183.111.227.137:8080
196.218.30.83:443
103.70.28.102:8080
51.91.76.89:8080
91.207.28.33:8080
72.15.201.15:8080
103.43.46.182:443
209.250.246.206:443
197.242.150.244:8080
159.65.88.10:8080
172.104.251.154:8080
158.69.222.101:443
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 1056 WScript.exe -
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1056 WScript.exe -
Loads dropped DLL 1 IoCs
pid Process 1348 regsvR32.ExE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\Esbpo\tmgde.ehy regsvR32.ExE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 588 regsvr32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1348 1056 WScript.exe 27 PID 1056 wrote to memory of 1348 1056 WScript.exe 27 PID 1056 wrote to memory of 1348 1056 WScript.exe 27 PID 1056 wrote to memory of 1348 1056 WScript.exe 27 PID 1056 wrote to memory of 1348 1056 WScript.exe 27 PID 1348 wrote to memory of 588 1348 regsvR32.ExE 28 PID 1348 wrote to memory of 588 1348 regsvR32.ExE 28 PID 1348 wrote to memory of 588 1348 regsvR32.ExE 28 PID 1348 wrote to memory of 588 1348 regsvR32.ExE 28 PID 1348 wrote to memory of 588 1348 regsvR32.ExE 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\VEuIqlISMa.vbs"1⤵
- Blocklisted process makes network request
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SYstem32\regsvR32.ExEC:\Windows\SYstem32\regsvR32.ExE C:\Users\Admin\AppData\Local\Temp\vmTbfGSBOW.qsj2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\Esbpo\tmgde.ehy"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:588
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
626KB
MD5e533a38e9c536cdaada20562d5fdca95
SHA1cc698330d55694d96989eae7e85b4a261b2b51a1
SHA256cd49d1a44084add2f38189da4460d8b5733353fc0f31e99ea36e7e8ca0de5496
SHA5127f15e6bfd65f7248d460bca8e2d5732c5ff39fb6c3392293ec5b27908f5c166cfd66931ad3ad09e7d235444091157f3259428a954305c485a93db1ad6eb99290
-
Filesize
626KB
MD5e533a38e9c536cdaada20562d5fdca95
SHA1cc698330d55694d96989eae7e85b4a261b2b51a1
SHA256cd49d1a44084add2f38189da4460d8b5733353fc0f31e99ea36e7e8ca0de5496
SHA5127f15e6bfd65f7248d460bca8e2d5732c5ff39fb6c3392293ec5b27908f5c166cfd66931ad3ad09e7d235444091157f3259428a954305c485a93db1ad6eb99290