Resubmissions

22-04-2022 21:47

220422-1nnmyagdf2 10

Analysis

  • max time kernel
    102s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    22-04-2022 21:47

General

  • Target

    VEuIqlISMa.vbs

  • Size

    2KB

  • MD5

    e759c57fef989e9230cf121b31e077ec

  • SHA1

    434f3d7d49a06606c0fb73e1a2378836f2018338

  • SHA256

    bc84d7201f37b0c02ff742f4b8c5d78412796676724fc0af530975dac2fff063

  • SHA512

    552b94d3950641f62bcd5be46308fb3e2ab1014b3235c2b4a74d6c4f222fbe71d6991c4cb7325aa5b57f20edbd112c6b89320362ca87ee8c3a24c7f8a605e736

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

138.201.142.73:8080

138.197.147.101:443

134.195.212.50:7080

104.168.154.79:8080

149.56.131.28:8080

129.232.188.93:443

212.24.98.99:8080

119.193.124.41:7080

45.118.115.99:8080

188.44.20.25:443

103.132.242.26:8080

201.94.166.162:443

1.234.21.73:7080

206.189.28.199:8080

185.8.212.130:7080

82.165.152.127:8080

176.104.106.96:8080

173.212.193.249:8080

167.99.115.35:8080

209.126.98.206:8080

eck1.plain
ecs1.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\VEuIqlISMa.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Windows\SYstem32\regsvR32.ExE
      C:\Windows\SYstem32\regsvR32.ExE C:\Users\Admin\AppData\Local\Temp\vmTbfGSBOW.qsj
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\Sfknanmeejr\kzkjz.sed"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:2348

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VMtbfGSBow.QsJ

    Filesize

    626KB

    MD5

    f51d146be54c2269f89e218cd726f9c2

    SHA1

    fd4dd101b38a7748b303c65820020d3b01d10549

    SHA256

    33e96b8980d5755bfebd0cb9a7291fd0a575e443fb573248295abc274eb9c147

    SHA512

    a2918786499633c07e70fcd393f05a85aa4786c21fe17d0aba8cf1fd9b920f282ec855f0af12c09bddda60075679eadfe0ec223e3d8573ad79423ade9526a375

  • C:\Users\Admin\AppData\Local\Temp\vmTbfGSBOW.qsj

    Filesize

    626KB

    MD5

    f51d146be54c2269f89e218cd726f9c2

    SHA1

    fd4dd101b38a7748b303c65820020d3b01d10549

    SHA256

    33e96b8980d5755bfebd0cb9a7291fd0a575e443fb573248295abc274eb9c147

    SHA512

    a2918786499633c07e70fcd393f05a85aa4786c21fe17d0aba8cf1fd9b920f282ec855f0af12c09bddda60075679eadfe0ec223e3d8573ad79423ade9526a375

  • C:\Windows\System32\Sfknanmeejr\kzkjz.sed

    Filesize

    626KB

    MD5

    f51d146be54c2269f89e218cd726f9c2

    SHA1

    fd4dd101b38a7748b303c65820020d3b01d10549

    SHA256

    33e96b8980d5755bfebd0cb9a7291fd0a575e443fb573248295abc274eb9c147

    SHA512

    a2918786499633c07e70fcd393f05a85aa4786c21fe17d0aba8cf1fd9b920f282ec855f0af12c09bddda60075679eadfe0ec223e3d8573ad79423ade9526a375

  • memory/4664-133-0x0000000180000000-0x000000018002A000-memory.dmp

    Filesize

    168KB