Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 18:30

General

  • Target

    4a8db65e13e79ad9891b42776b16d2fa456ad913b880328b344d435333453912.exe

  • Size

    252KB

  • MD5

    3aa0bf0b7b6f67502df77507bd446ec2

  • SHA1

    2c8e16ac41ffbe754cbdeab233789af7f21f5775

  • SHA256

    4a8db65e13e79ad9891b42776b16d2fa456ad913b880328b344d435333453912

  • SHA512

    5dbe1f32d35da44732b038d5cf4da33304392e19b06de62936409a28e2f2b00634d999e688c8fc267a282ba8a222bdf1666a1a6166f4d6f1b1b40438cd69826c

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

64.183.73.122:80

69.30.203.214:8080

67.205.85.243:8080

222.214.218.37:4143

104.236.246.93:8080

110.145.77.103:80

89.186.91.200:443

74.120.55.163:80

95.179.229.244:8080

70.167.215.250:8080

47.146.117.214:80

209.141.54.221:8080

24.43.99.75:80

103.86.49.11:8080

142.105.151.124:443

62.138.26.28:8080

24.179.13.119:80

37.187.72.193:8080

137.59.187.107:8080

97.82.79.83:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet Payload 2 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a8db65e13e79ad9891b42776b16d2fa456ad913b880328b344d435333453912.exe
    "C:\Users\Admin\AppData\Local\Temp\4a8db65e13e79ad9891b42776b16d2fa456ad913b880328b344d435333453912.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2076
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
    1⤵
      PID:460

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2076-132-0x00000000008E0000-0x00000000008E9000-memory.dmp
      Filesize

      36KB

    • memory/2076-130-0x00000000008F0000-0x00000000008FC000-memory.dmp
      Filesize

      48KB