Analysis

  • max time kernel
    146s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 18:32

General

  • Target

    cbd594c8b7a6a38c0fa44301d0f3cddeb73217bc6412ba77119ff3acee4f7bb6.exe

  • Size

    548KB

  • MD5

    10f97b3e3c474fd4af4494f542cfd961

  • SHA1

    aaecfe1c1fd3569ee742a721926b21e3296fac26

  • SHA256

    cbd594c8b7a6a38c0fa44301d0f3cddeb73217bc6412ba77119ff3acee4f7bb6

  • SHA512

    a3ccecda5bf1895c3563b77e12708f0ddb75e91feef7f4c24b526ee8dfc0bf606ce2d23b2d7933cb99bd20470140e46d29b913b5d4e94e6aa57f327b3e4eac29

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

64.183.73.122:80

69.30.203.214:8080

67.205.85.243:8080

222.214.218.37:4143

104.236.246.93:8080

110.145.77.103:80

89.186.91.200:443

74.120.55.163:80

95.179.229.244:8080

70.167.215.250:8080

47.146.117.214:80

209.141.54.221:8080

24.43.99.75:80

103.86.49.11:8080

142.105.151.124:443

62.138.26.28:8080

24.179.13.119:80

37.187.72.193:8080

137.59.187.107:8080

97.82.79.83:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet Payload 2 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbd594c8b7a6a38c0fa44301d0f3cddeb73217bc6412ba77119ff3acee4f7bb6.exe
    "C:\Users\Admin\AppData\Local\Temp\cbd594c8b7a6a38c0fa44301d0f3cddeb73217bc6412ba77119ff3acee4f7bb6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/756-54-0x00000000763E1000-0x00000000763E3000-memory.dmp
    Filesize

    8KB

  • memory/756-55-0x0000000000290000-0x000000000029C000-memory.dmp
    Filesize

    48KB

  • memory/756-59-0x0000000000230000-0x0000000000235000-memory.dmp
    Filesize

    20KB