Overview
overview
10Static
static
0374bb627e...71.dll
windows7_x64
100374bb627e...71.dll
windows10-2004_x64
100ba117fd39...35.exe
windows7_x64
100ba117fd39...35.exe
windows10-2004_x64
10196c17a866...fe.exe
windows7_x64
10196c17a866...fe.exe
windows10-2004_x64
101e0215f67f...53.exe
windows7_x64
101e0215f67f...53.exe
windows10-2004_x64
1025d04d6314...de.exe
windows7_x64
1025d04d6314...de.exe
windows10-2004_x64
10428ff553b6...50.exe
windows7_x64
10428ff553b6...50.exe
windows10-2004_x64
10455d08a5e2...ce.exe
windows7_x64
10455d08a5e2...ce.exe
windows10-2004_x64
104dbd0cd1e0...59.dll
windows7_x64
104dbd0cd1e0...59.dll
windows10-2004_x64
104febaf5c3e...92.exe
windows7_x64
104febaf5c3e...92.exe
windows10-2004_x64
105282f373b4...ff.exe
windows7_x64
95282f373b4...ff.exe
windows10-2004_x64
96c2e494f16...47.exe
windows7_x64
106c2e494f16...47.exe
windows10-2004_x64
106c95be6a53...65.exe
windows7_x64
106c95be6a53...65.exe
windows10-2004_x64
1075a5b0e0e9...1a.exe
windows7_x64
1075a5b0e0e9...1a.exe
windows10-2004_x64
107dd89cf8a1...d2.exe
windows7_x64
107dd89cf8a1...d2.exe
windows10-2004_x64
1081fa8a3bdc...77.exe
windows7_x64
1081fa8a3bdc...77.exe
windows10-2004_x64
109268e1f0af...b0.dll
windows7_x64
109268e1f0af...b0.dll
windows10-2004_x64
10Analysis
-
max time kernel
311s -
max time network
317s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 13:51
Static task
static1
Behavioral task
behavioral1
Sample
0374bb627e51aa5fa5df0640a5468939cf190a1a1bc0c8a0f3df4bc9b3e92171.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0374bb627e51aa5fa5df0640a5468939cf190a1a1bc0c8a0f3df4bc9b3e92171.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
196c17a866c395520e3440779c11fa79063127efb81cfb5d44f9c664f6a790fe.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
196c17a866c395520e3440779c11fa79063127efb81cfb5d44f9c664f6a790fe.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
1e0215f67fb7b02bc44f33bf6a5b884c3061cbeb38e0150b559635458951fa53.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
1e0215f67fb7b02bc44f33bf6a5b884c3061cbeb38e0150b559635458951fa53.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
25d04d6314390db9f02656b70f9d0da208b7d3e4dd47ece7cb907854a2c07dde.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
25d04d6314390db9f02656b70f9d0da208b7d3e4dd47ece7cb907854a2c07dde.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
428ff553b67cd782e6d0227ae09c83ba8074fa11cf4bfd91703b2043aa5f6c50.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
428ff553b67cd782e6d0227ae09c83ba8074fa11cf4bfd91703b2043aa5f6c50.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
4dbd0cd1e0f85d16cb65f376880ca9ba247bd1f81542f135610f951349909959.dll
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
4dbd0cd1e0f85d16cb65f376880ca9ba247bd1f81542f135610f951349909959.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
4febaf5c3eb1938f657200df1141457d1bb34b9b67222f2e889c9785dd99e492.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
4febaf5c3eb1938f657200df1141457d1bb34b9b67222f2e889c9785dd99e492.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
6c2e494f16262d6e4b2eaa552971b562a2bb87ac71a73a8be8638aefb47f1a47.exe
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
6c2e494f16262d6e4b2eaa552971b562a2bb87ac71a73a8be8638aefb47f1a47.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
6c95be6a536264db1dcb3c13b03b6f67d04b75a49cb9411fa294352590df2e65.exe
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
6c95be6a536264db1dcb3c13b03b6f67d04b75a49cb9411fa294352590df2e65.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
75a5b0e0e96691e1aacf99aba23f9b2a53ef8c349a8822494b7b82c400b5a61a.exe
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
75a5b0e0e96691e1aacf99aba23f9b2a53ef8c349a8822494b7b82c400b5a61a.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
7dd89cf8a1fd81909f2dd9b75cffa1f7ed98ae94c381a6c92ffd0a0dee7707d2.exe
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
7dd89cf8a1fd81909f2dd9b75cffa1f7ed98ae94c381a6c92ffd0a0dee7707d2.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77.exe
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
9268e1f0af209ecb3d16ddbb4b5f294194c62b54812b02aba7efc7b1306c0fb0.dll
Resource
win7-20220414-en
General
-
Target
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe
-
Size
296KB
-
MD5
ac35802d7f24f8c48231c4ad3dba6ca8
-
SHA1
d4e091c21fbd85e1b3ab5ff2f03eb89df2ffb9bd
-
SHA256
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce
-
SHA512
f980d12472e06782a1e05a0c9c22e60a54841d63b611b3ecc71fb8475305fc00d01fc266ec21899d0e0dede7ed850f9930ede17d01b874385415450ca952020a
Malware Config
Extracted
emotet
Epoch2
47.146.39.147:80
152.170.205.73:80
185.201.9.197:8080
64.207.182.168:8080
51.89.36.180:443
85.105.111.166:80
139.59.60.244:8080
187.161.206.24:80
98.150.169.135:80
123.176.25.234:80
74.40.205.197:443
24.179.13.119:80
188.219.31.12:80
172.86.188.251:8080
76.175.162.101:80
72.27.212.209:8080
173.173.254.105:80
120.150.60.189:80
139.99.158.11:443
155.186.9.160:80
5.39.91.110:7080
134.209.144.106:443
157.245.99.39:8080
91.211.88.52:7080
109.74.5.95:8080
202.134.4.216:8080
184.180.181.202:80
208.74.26.234:80
190.29.166.0:80
137.59.187.107:8080
74.208.45.104:8080
62.75.141.82:80
49.50.209.131:80
50.91.114.38:80
142.112.10.95:20
176.111.60.55:8080
78.24.219.147:8080
220.245.198.194:80
190.108.228.27:443
24.101.229.82:80
110.142.236.207:80
12.184.217.101:80
24.178.90.49:80
95.213.236.64:8080
37.139.21.175:8080
174.118.202.24:443
173.63.222.65:80
67.10.155.92:80
181.165.68.127:80
185.94.252.104:443
99.247.33.186:80
5.2.212.254:80
202.141.243.254:443
172.105.13.66:443
100.37.240.62:80
168.235.67.138:7080
119.59.116.21:8080
76.27.179.47:80
115.94.207.99:443
201.241.127.190:80
24.69.65.8:8080
51.89.199.141:8080
202.134.4.211:8080
161.0.153.60:80
118.83.154.64:443
104.131.11.150:443
110.145.101.66:443
190.162.215.233:80
79.137.83.50:443
103.86.49.11:8080
94.23.237.171:443
217.20.166.178:7080
74.128.121.17:80
62.171.142.179:8080
167.114.153.111:8080
95.9.5.93:80
74.135.120.91:80
72.186.136.247:443
190.146.92.48:80
121.124.124.40:7080
110.145.77.103:80
94.230.70.6:80
190.164.104.62:80
109.116.245.80:80
41.185.28.84:8080
172.125.40.123:80
194.190.67.75:80
172.104.97.173:8080
2.58.16.89:8080
112.185.64.233:80
80.227.52.78:80
87.106.139.101:8080
186.74.215.34:80
209.141.54.221:7080
200.116.145.225:443
62.30.7.67:443
75.143.247.51:80
37.187.72.193:8080
190.240.194.77:443
113.61.66.94:80
203.153.216.189:7080
172.91.208.86:80
89.216.122.92:80
139.162.60.124:8080
50.245.107.73:443
194.4.58.192:7080
138.68.87.218:443
108.21.72.56:443
120.150.218.241:443
61.19.246.238:443
47.36.140.164:80
46.105.131.79:8080
74.75.104.224:80
Signatures
-
Processes:
resource yara_rule behavioral14/memory/4644-130-0x0000000002220000-0x0000000002232000-memory.dmp emotet behavioral14/memory/4644-134-0x0000000002240000-0x0000000002250000-memory.dmp emotet behavioral14/memory/4644-137-0x0000000002210000-0x000000000221F000-memory.dmp emotet behavioral14/memory/2296-140-0x00000000020E0000-0x00000000020F2000-memory.dmp emotet behavioral14/memory/2296-144-0x0000000002100000-0x0000000002110000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
Processes:
expsrv.exepid process 2296 expsrv.exe -
Drops file in System32 directory 1 IoCs
Processes:
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Windows.AccountsControl\expsrv.exe 455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe -
Drops file in Windows directory 2 IoCs
Processes:
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exeexpsrv.exedescription ioc process File opened for modification C:\Windows\notepad.exe 455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe File opened for modification C:\Windows\notepad.exe expsrv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
expsrv.exepid process 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe 2296 expsrv.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exepid process 4644 455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exeexpsrv.exepid process 4644 455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe 2296 expsrv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exedescription pid process target process PID 4644 wrote to memory of 2296 4644 455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe expsrv.exe PID 4644 wrote to memory of 2296 4644 455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe expsrv.exe PID 4644 wrote to memory of 2296 4644 455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe expsrv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe"C:\Users\Admin\AppData\Local\Temp\455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\Windows.AccountsControl\expsrv.exe"C:\Windows\SysWOW64\Windows.AccountsControl\expsrv.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5ac35802d7f24f8c48231c4ad3dba6ca8
SHA1d4e091c21fbd85e1b3ab5ff2f03eb89df2ffb9bd
SHA256455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce
SHA512f980d12472e06782a1e05a0c9c22e60a54841d63b611b3ecc71fb8475305fc00d01fc266ec21899d0e0dede7ed850f9930ede17d01b874385415450ca952020a