Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-06-2022 22:39
Static task
static1
Behavioral task
behavioral1
Sample
34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe
Resource
win7-20220414-en
General
-
Target
34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe
-
Size
275KB
-
MD5
0edc1d0416e429be7b5622bbd8332737
-
SHA1
80f03cf8b4cd9a30259593ee906cf61701032c79
-
SHA256
34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0
-
SHA512
73256722267499dbc8cffc43f8fbca6fd3f10a4b02f967455f215e830a944c70c78832a9d5f25b1cc31c1286c3adaf529b7923faccbe65f95001413b354a9948
Malware Config
Extracted
emotet
Epoch1
181.123.0.125:80
119.159.150.176:443
184.69.214.94:20
80.240.141.141:7080
185.187.198.10:8080
46.41.134.46:8080
178.249.187.151:8080
217.199.160.224:8080
186.83.133.253:8080
23.92.22.225:7080
212.71.237.140:8080
190.221.50.210:8080
187.199.158.226:443
185.86.148.222:8080
200.58.171.51:80
77.245.101.134:8080
201.163.74.202:443
203.25.159.3:8080
183.82.97.25:80
51.15.8.192:8080
5.77.13.70:80
181.36.42.205:443
178.79.163.131:8080
217.113.27.158:443
62.75.143.100:7080
189.187.141.15:50000
77.55.211.77:8080
81.169.140.14:443
87.106.77.40:7080
114.79.134.129:443
217.199.175.216:8080
149.62.173.247:8080
46.29.183.211:8080
200.21.90.6:8080
187.188.166.192:80
123.168.4.66:22
190.230.60.129:80
138.68.106.4:7080
181.167.53.209:80
190.200.64.180:7080
190.104.253.234:990
119.92.51.40:8080
62.75.160.178:8080
186.0.95.172:80
109.169.86.13:8080
151.80.142.33:80
119.59.124.163:8080
86.42.166.147:80
71.244.60.231:7080
50.28.51.143:8080
91.205.215.57:7080
80.85.87.122:8080
201.214.74.71:80
179.62.18.56:443
89.188.124.145:443
190.38.14.52:80
190.117.206.153:443
71.244.60.230:7080
201.184.65.229:80
88.250.223.190:8080
5.196.35.138:7080
139.5.237.27:443
187.155.233.46:443
190.158.19.141:80
46.21.105.59:8080
187.199.158.226:7080
189.166.68.89:443
200.57.102.71:8443
159.203.204.126:8080
181.188.149.134:80
46.163.144.228:80
91.83.93.124:7080
170.84.133.72:8443
46.28.111.142:7080
211.229.116.97:80
109.104.79.48:8080
46.41.151.103:8080
190.1.37.125:443
190.230.60.129:8080
170.84.133.72:7080
79.143.182.254:8080
181.230.212.74:80
187.235.239.214:8080
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat twoshell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2040 set thread context of 864 2040 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 28 PID 1252 set thread context of 1336 1252 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 30 PID 280 set thread context of 1600 280 twoshell.exe 32 PID 1684 set thread context of 908 1684 twoshell.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings twoshell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" twoshell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 twoshell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0099000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 twoshell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{254723E3-C1C0-45E9-AE57-4ED7BE3B9CCF}\WpadDecisionTime = 908638ab4284d801 twoshell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{254723E3-C1C0-45E9-AE57-4ED7BE3B9CCF}\WpadNetworkName = "Network 3" twoshell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{254723E3-C1C0-45E9-AE57-4ED7BE3B9CCF}\e2-7d-a3-2b-81-d4 twoshell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" twoshell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections twoshell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" twoshell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad twoshell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{254723E3-C1C0-45E9-AE57-4ED7BE3B9CCF}\WpadDecisionReason = "1" twoshell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-7d-a3-2b-81-d4 twoshell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-7d-a3-2b-81-d4\WpadDecisionReason = "1" twoshell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings twoshell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix twoshell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-7d-a3-2b-81-d4\WpadDecisionTime = 908638ab4284d801 twoshell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-7d-a3-2b-81-d4\WpadDecision = "0" twoshell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 twoshell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{254723E3-C1C0-45E9-AE57-4ED7BE3B9CCF}\WpadDecision = "0" twoshell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{254723E3-C1C0-45E9-AE57-4ED7BE3B9CCF} twoshell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 908 twoshell.exe 908 twoshell.exe 908 twoshell.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2040 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 1252 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 280 twoshell.exe 1684 twoshell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1336 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2040 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 1252 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 280 twoshell.exe 1684 twoshell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2040 wrote to memory of 864 2040 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 28 PID 2040 wrote to memory of 864 2040 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 28 PID 2040 wrote to memory of 864 2040 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 28 PID 2040 wrote to memory of 864 2040 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 28 PID 2040 wrote to memory of 864 2040 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 28 PID 864 wrote to memory of 1252 864 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 29 PID 864 wrote to memory of 1252 864 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 29 PID 864 wrote to memory of 1252 864 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 29 PID 864 wrote to memory of 1252 864 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 29 PID 1252 wrote to memory of 1336 1252 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 30 PID 1252 wrote to memory of 1336 1252 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 30 PID 1252 wrote to memory of 1336 1252 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 30 PID 1252 wrote to memory of 1336 1252 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 30 PID 1252 wrote to memory of 1336 1252 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 30 PID 280 wrote to memory of 1600 280 twoshell.exe 32 PID 280 wrote to memory of 1600 280 twoshell.exe 32 PID 280 wrote to memory of 1600 280 twoshell.exe 32 PID 280 wrote to memory of 1600 280 twoshell.exe 32 PID 280 wrote to memory of 1600 280 twoshell.exe 32 PID 1600 wrote to memory of 1684 1600 twoshell.exe 33 PID 1600 wrote to memory of 1684 1600 twoshell.exe 33 PID 1600 wrote to memory of 1684 1600 twoshell.exe 33 PID 1600 wrote to memory of 1684 1600 twoshell.exe 33 PID 1684 wrote to memory of 908 1684 twoshell.exe 34 PID 1684 wrote to memory of 908 1684 twoshell.exe 34 PID 1684 wrote to memory of 908 1684 twoshell.exe 34 PID 1684 wrote to memory of 908 1684 twoshell.exe 34 PID 1684 wrote to memory of 908 1684 twoshell.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe"C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe"C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe--2c4a69593⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe--2c4a69594⤵
- Suspicious behavior: RenamesItself
PID:1336
-
-
-
-
C:\Windows\SysWOW64\twoshell.exe"C:\Windows\SysWOW64\twoshell.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\twoshell.exe"C:\Windows\SysWOW64\twoshell.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\twoshell.exe--8138d4d63⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\twoshell.exe--8138d4d64⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
-