Analysis

  • max time kernel
    137s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-06-2022 18:26

General

  • Target

    181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe

  • Size

    392KB

  • MD5

    2786dfd0ed97686709bc57c8ad423e75

  • SHA1

    a87120c4082f3bf46ac4a924e2479d2a317f43d4

  • SHA256

    181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92

  • SHA512

    b60e29ea0429700478447104b84ed3aeefe38ddb7914a354c18197eef502dd4fff2a308fe42d13c46c975f48c21d065879a205d6acfcf9cbdea13207d0d71833

Score
10/10

Malware Config

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe
    "C:\Users\Admin\AppData\Local\Temp\181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Users\Admin\AppData\Local\Temp\181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe
      --2cbd0846
      2⤵
      • Suspicious behavior: RenamesItself
      PID:1412
  • C:\Windows\SysWOW64\texturenis.exe
    "C:\Windows\SysWOW64\texturenis.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Windows\SysWOW64\texturenis.exe
      --ffa69c4f
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:220

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/220-137-0x0000000000000000-mapping.dmp

  • memory/220-139-0x0000000000300000-0x0000000000367000-memory.dmp

    Filesize

    412KB

  • memory/1412-132-0x0000000000000000-mapping.dmp

  • memory/1412-134-0x0000000000300000-0x0000000000367000-memory.dmp

    Filesize

    412KB

  • memory/4048-136-0x0000000000300000-0x0000000000367000-memory.dmp

    Filesize

    412KB

  • memory/4508-131-0x0000000000300000-0x0000000000367000-memory.dmp

    Filesize

    412KB

  • memory/4508-130-0x0000000000300000-0x0000000000314000-memory.dmp

    Filesize

    80KB