Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-06-2022 22:39
Static task
static1
Behavioral task
behavioral1
Sample
34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe
Resource
win7-20220414-en
General
-
Target
34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe
-
Size
275KB
-
MD5
0edc1d0416e429be7b5622bbd8332737
-
SHA1
80f03cf8b4cd9a30259593ee906cf61701032c79
-
SHA256
34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0
-
SHA512
73256722267499dbc8cffc43f8fbca6fd3f10a4b02f967455f215e830a944c70c78832a9d5f25b1cc31c1286c3adaf529b7923faccbe65f95001413b354a9948
Malware Config
Extracted
emotet
Epoch1
181.123.0.125:80
119.159.150.176:443
184.69.214.94:20
80.240.141.141:7080
185.187.198.10:8080
46.41.134.46:8080
178.249.187.151:8080
217.199.160.224:8080
186.83.133.253:8080
23.92.22.225:7080
212.71.237.140:8080
190.221.50.210:8080
187.199.158.226:443
185.86.148.222:8080
200.58.171.51:80
77.245.101.134:8080
201.163.74.202:443
203.25.159.3:8080
183.82.97.25:80
51.15.8.192:8080
5.77.13.70:80
181.36.42.205:443
178.79.163.131:8080
217.113.27.158:443
62.75.143.100:7080
189.187.141.15:50000
77.55.211.77:8080
81.169.140.14:443
87.106.77.40:7080
114.79.134.129:443
217.199.175.216:8080
149.62.173.247:8080
46.29.183.211:8080
200.21.90.6:8080
187.188.166.192:80
123.168.4.66:22
190.230.60.129:80
138.68.106.4:7080
181.167.53.209:80
190.200.64.180:7080
190.104.253.234:990
119.92.51.40:8080
62.75.160.178:8080
186.0.95.172:80
109.169.86.13:8080
151.80.142.33:80
119.59.124.163:8080
86.42.166.147:80
71.244.60.231:7080
50.28.51.143:8080
91.205.215.57:7080
80.85.87.122:8080
201.214.74.71:80
179.62.18.56:443
89.188.124.145:443
190.38.14.52:80
190.117.206.153:443
71.244.60.230:7080
201.184.65.229:80
88.250.223.190:8080
5.196.35.138:7080
139.5.237.27:443
187.155.233.46:443
190.158.19.141:80
46.21.105.59:8080
187.199.158.226:7080
189.166.68.89:443
200.57.102.71:8443
159.203.204.126:8080
181.188.149.134:80
46.163.144.228:80
91.83.93.124:7080
170.84.133.72:8443
46.28.111.142:7080
211.229.116.97:80
109.104.79.48:8080
46.41.151.103:8080
190.1.37.125:443
190.230.60.129:8080
170.84.133.72:7080
79.143.182.254:8080
181.230.212.74:80
187.235.239.214:8080
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE windowinset.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies windowinset.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 windowinset.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 windowinset.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 816 set thread context of 4136 816 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 79 PID 4668 set thread context of 5080 4668 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 81 PID 1524 set thread context of 3024 1524 windowinset.exe 83 PID 4712 set thread context of 4184 4712 windowinset.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix windowinset.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" windowinset.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" windowinset.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4184 windowinset.exe 4184 windowinset.exe 4184 windowinset.exe 4184 windowinset.exe 4184 windowinset.exe 4184 windowinset.exe 4184 windowinset.exe 4184 windowinset.exe 4184 windowinset.exe 4184 windowinset.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 816 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 4668 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 1524 windowinset.exe 4712 windowinset.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5080 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 816 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 4668 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 1524 windowinset.exe 4712 windowinset.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 816 wrote to memory of 4136 816 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 79 PID 816 wrote to memory of 4136 816 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 79 PID 816 wrote to memory of 4136 816 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 79 PID 816 wrote to memory of 4136 816 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 79 PID 4136 wrote to memory of 4668 4136 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 80 PID 4136 wrote to memory of 4668 4136 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 80 PID 4136 wrote to memory of 4668 4136 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 80 PID 4668 wrote to memory of 5080 4668 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 81 PID 4668 wrote to memory of 5080 4668 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 81 PID 4668 wrote to memory of 5080 4668 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 81 PID 4668 wrote to memory of 5080 4668 34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe 81 PID 1524 wrote to memory of 3024 1524 windowinset.exe 83 PID 1524 wrote to memory of 3024 1524 windowinset.exe 83 PID 1524 wrote to memory of 3024 1524 windowinset.exe 83 PID 1524 wrote to memory of 3024 1524 windowinset.exe 83 PID 3024 wrote to memory of 4712 3024 windowinset.exe 84 PID 3024 wrote to memory of 4712 3024 windowinset.exe 84 PID 3024 wrote to memory of 4712 3024 windowinset.exe 84 PID 4712 wrote to memory of 4184 4712 windowinset.exe 85 PID 4712 wrote to memory of 4184 4712 windowinset.exe 85 PID 4712 wrote to memory of 4184 4712 windowinset.exe 85 PID 4712 wrote to memory of 4184 4712 windowinset.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe"C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe"C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe--2c4a69593⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\34222f81e9d8bd85c6b6e66b94da2d1e118f29d206b12b323abc81ad94bd55a0.exe--2c4a69594⤵
- Suspicious behavior: RenamesItself
PID:5080
-
-
-
-
C:\Windows\SysWOW64\windowinset.exe"C:\Windows\SysWOW64\windowinset.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\windowinset.exe"C:\Windows\SysWOW64\windowinset.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\windowinset.exe--80c3ad833⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\windowinset.exe--80c3ad834⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
-