Resubmissions
22-04-2022 21:47
220422-1nnmyagdf2 10Analysis
-
max time kernel
102s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-04-2022 21:47
Static task
static1
Behavioral task
behavioral1
Sample
VEuIqlISMa.vbs
Resource
win7-20220414-en
General
-
Target
VEuIqlISMa.vbs
-
Size
2KB
-
MD5
e759c57fef989e9230cf121b31e077ec
-
SHA1
434f3d7d49a06606c0fb73e1a2378836f2018338
-
SHA256
bc84d7201f37b0c02ff742f4b8c5d78412796676724fc0af530975dac2fff063
-
SHA512
552b94d3950641f62bcd5be46308fb3e2ab1014b3235c2b4a74d6c4f222fbe71d6991c4cb7325aa5b57f20edbd112c6b89320362ca87ee8c3a24c7f8a605e736
Malware Config
Extracted
emotet
Epoch4
138.201.142.73:8080
138.197.147.101:443
134.195.212.50:7080
104.168.154.79:8080
149.56.131.28:8080
129.232.188.93:443
212.24.98.99:8080
119.193.124.41:7080
45.118.115.99:8080
188.44.20.25:443
103.132.242.26:8080
201.94.166.162:443
1.234.21.73:7080
206.189.28.199:8080
185.8.212.130:7080
82.165.152.127:8080
176.104.106.96:8080
173.212.193.249:8080
167.99.115.35:8080
209.126.98.206:8080
185.157.82.211:8080
212.237.17.99:8080
185.4.135.165:8080
51.91.7.5:8080
187.84.80.182:443
164.68.99.3:8080
107.182.225.142:8080
58.227.42.236:80
103.75.201.2:443
101.50.0.91:8080
216.158.226.206:443
151.106.112.196:8080
45.235.8.30:8080
146.59.226.45:443
45.176.232.124:443
134.122.66.193:8080
51.254.140.238:7080
131.100.24.231:80
167.172.253.162:8080
50.30.40.196:8080
203.114.109.124:443
94.23.45.86:4143
189.126.111.200:7080
160.16.142.56:8080
27.54.89.58:8080
5.9.116.246:8080
46.55.222.11:443
209.97.163.214:443
110.232.117.186:8080
1.234.2.232:8080
153.126.146.25:7080
183.111.227.137:8080
196.218.30.83:443
103.70.28.102:8080
51.91.76.89:8080
91.207.28.33:8080
72.15.201.15:8080
103.43.46.182:443
209.250.246.206:443
197.242.150.244:8080
159.65.88.10:8080
172.104.251.154:8080
158.69.222.101:443
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 12 4632 WScript.exe -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 4664 regsvR32.ExE 2348 regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\Sfknanmeejr\kzkjz.sed regsvR32.ExE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2348 regsvr32.exe 2348 regsvr32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4632 wrote to memory of 4664 4632 WScript.exe 83 PID 4632 wrote to memory of 4664 4632 WScript.exe 83 PID 4664 wrote to memory of 2348 4664 regsvR32.ExE 85 PID 4664 wrote to memory of 2348 4664 regsvR32.ExE 85
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\VEuIqlISMa.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SYstem32\regsvR32.ExEC:\Windows\SYstem32\regsvR32.ExE C:\Users\Admin\AppData\Local\Temp\vmTbfGSBOW.qsj2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\Sfknanmeejr\kzkjz.sed"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
626KB
MD5f51d146be54c2269f89e218cd726f9c2
SHA1fd4dd101b38a7748b303c65820020d3b01d10549
SHA25633e96b8980d5755bfebd0cb9a7291fd0a575e443fb573248295abc274eb9c147
SHA512a2918786499633c07e70fcd393f05a85aa4786c21fe17d0aba8cf1fd9b920f282ec855f0af12c09bddda60075679eadfe0ec223e3d8573ad79423ade9526a375
-
Filesize
626KB
MD5f51d146be54c2269f89e218cd726f9c2
SHA1fd4dd101b38a7748b303c65820020d3b01d10549
SHA25633e96b8980d5755bfebd0cb9a7291fd0a575e443fb573248295abc274eb9c147
SHA512a2918786499633c07e70fcd393f05a85aa4786c21fe17d0aba8cf1fd9b920f282ec855f0af12c09bddda60075679eadfe0ec223e3d8573ad79423ade9526a375
-
Filesize
626KB
MD5f51d146be54c2269f89e218cd726f9c2
SHA1fd4dd101b38a7748b303c65820020d3b01d10549
SHA25633e96b8980d5755bfebd0cb9a7291fd0a575e443fb573248295abc274eb9c147
SHA512a2918786499633c07e70fcd393f05a85aa4786c21fe17d0aba8cf1fd9b920f282ec855f0af12c09bddda60075679eadfe0ec223e3d8573ad79423ade9526a375