Analysis

  • max time kernel
    125s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 19:14

General

  • Target

    2ba27c09ccd56483e32bf6c33423a3e4bba9b3880b9fdf6c1012a86bd0edc7e3.exe

  • Size

    432KB

  • MD5

    3503ac6abb73548b169b85e7f7acfc6d

  • SHA1

    1ae8d43e836e8866ebafb57107ba6576944eed5f

  • SHA256

    2ba27c09ccd56483e32bf6c33423a3e4bba9b3880b9fdf6c1012a86bd0edc7e3

  • SHA512

    3021bdffa979943fe42e648b0434cc8173b100bd19273cb474fe8ae0f9b37a2a763893ed7ef76d1030c1a22dc54721b83f25d0f64c285e2522e38a200860f604

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

181.30.61.163:443

209.126.6.222:8080

5.153.250.14:8080

188.135.15.49:80

104.131.41.185:8080

178.250.54.208:8080

50.28.51.143:8080

170.81.48.2:80

87.106.46.107:8080

191.99.160.58:80

187.162.248.237:80

89.32.150.160:8080

46.28.111.142:7080

190.190.148.27:8080

190.115.18.139:8080

178.79.163.131:8080

73.213.208.163:80

219.92.8.17:8080

95.9.180.128:80

212.71.237.140:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M8

    suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M8

  • suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M9

    suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M9

  • Emotet Payload 2 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ba27c09ccd56483e32bf6c33423a3e4bba9b3880b9fdf6c1012a86bd0edc7e3.exe
    "C:\Users\Admin\AppData\Local\Temp\2ba27c09ccd56483e32bf6c33423a3e4bba9b3880b9fdf6c1012a86bd0edc7e3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/980-54-0x0000000076C01000-0x0000000076C03000-memory.dmp
    Filesize

    8KB

  • memory/980-55-0x0000000000250000-0x000000000025C000-memory.dmp
    Filesize

    48KB

  • memory/980-59-0x00000000001C0000-0x00000000001C9000-memory.dmp
    Filesize

    36KB