Overview
overview
10Static
static
0374bb627e...71.dll
windows7_x64
100374bb627e...71.dll
windows10-2004_x64
100ba117fd39...35.exe
windows7_x64
100ba117fd39...35.exe
windows10-2004_x64
10196c17a866...fe.exe
windows7_x64
10196c17a866...fe.exe
windows10-2004_x64
101e0215f67f...53.exe
windows7_x64
101e0215f67f...53.exe
windows10-2004_x64
1025d04d6314...de.exe
windows7_x64
1025d04d6314...de.exe
windows10-2004_x64
10428ff553b6...50.exe
windows7_x64
10428ff553b6...50.exe
windows10-2004_x64
10455d08a5e2...ce.exe
windows7_x64
10455d08a5e2...ce.exe
windows10-2004_x64
104dbd0cd1e0...59.dll
windows7_x64
104dbd0cd1e0...59.dll
windows10-2004_x64
104febaf5c3e...92.exe
windows7_x64
104febaf5c3e...92.exe
windows10-2004_x64
105282f373b4...ff.exe
windows7_x64
95282f373b4...ff.exe
windows10-2004_x64
96c2e494f16...47.exe
windows7_x64
106c2e494f16...47.exe
windows10-2004_x64
106c95be6a53...65.exe
windows7_x64
106c95be6a53...65.exe
windows10-2004_x64
1075a5b0e0e9...1a.exe
windows7_x64
1075a5b0e0e9...1a.exe
windows10-2004_x64
107dd89cf8a1...d2.exe
windows7_x64
107dd89cf8a1...d2.exe
windows10-2004_x64
1081fa8a3bdc...77.exe
windows7_x64
1081fa8a3bdc...77.exe
windows10-2004_x64
109268e1f0af...b0.dll
windows7_x64
109268e1f0af...b0.dll
windows10-2004_x64
10Analysis
-
max time kernel
312s -
max time network
326s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 13:51
Static task
static1
Behavioral task
behavioral1
Sample
0374bb627e51aa5fa5df0640a5468939cf190a1a1bc0c8a0f3df4bc9b3e92171.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0374bb627e51aa5fa5df0640a5468939cf190a1a1bc0c8a0f3df4bc9b3e92171.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
196c17a866c395520e3440779c11fa79063127efb81cfb5d44f9c664f6a790fe.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
196c17a866c395520e3440779c11fa79063127efb81cfb5d44f9c664f6a790fe.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
1e0215f67fb7b02bc44f33bf6a5b884c3061cbeb38e0150b559635458951fa53.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
1e0215f67fb7b02bc44f33bf6a5b884c3061cbeb38e0150b559635458951fa53.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
25d04d6314390db9f02656b70f9d0da208b7d3e4dd47ece7cb907854a2c07dde.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
25d04d6314390db9f02656b70f9d0da208b7d3e4dd47ece7cb907854a2c07dde.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
428ff553b67cd782e6d0227ae09c83ba8074fa11cf4bfd91703b2043aa5f6c50.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
428ff553b67cd782e6d0227ae09c83ba8074fa11cf4bfd91703b2043aa5f6c50.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
4dbd0cd1e0f85d16cb65f376880ca9ba247bd1f81542f135610f951349909959.dll
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
4dbd0cd1e0f85d16cb65f376880ca9ba247bd1f81542f135610f951349909959.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
4febaf5c3eb1938f657200df1141457d1bb34b9b67222f2e889c9785dd99e492.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
4febaf5c3eb1938f657200df1141457d1bb34b9b67222f2e889c9785dd99e492.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
6c2e494f16262d6e4b2eaa552971b562a2bb87ac71a73a8be8638aefb47f1a47.exe
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
6c2e494f16262d6e4b2eaa552971b562a2bb87ac71a73a8be8638aefb47f1a47.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
6c95be6a536264db1dcb3c13b03b6f67d04b75a49cb9411fa294352590df2e65.exe
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
6c95be6a536264db1dcb3c13b03b6f67d04b75a49cb9411fa294352590df2e65.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
75a5b0e0e96691e1aacf99aba23f9b2a53ef8c349a8822494b7b82c400b5a61a.exe
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
75a5b0e0e96691e1aacf99aba23f9b2a53ef8c349a8822494b7b82c400b5a61a.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
7dd89cf8a1fd81909f2dd9b75cffa1f7ed98ae94c381a6c92ffd0a0dee7707d2.exe
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
7dd89cf8a1fd81909f2dd9b75cffa1f7ed98ae94c381a6c92ffd0a0dee7707d2.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77.exe
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
9268e1f0af209ecb3d16ddbb4b5f294194c62b54812b02aba7efc7b1306c0fb0.dll
Resource
win7-20220414-en
General
-
Target
0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe
-
Size
280KB
-
MD5
f208db3d0b53573ddb865b8083297685
-
SHA1
db379d053d1aec9c1f8be9cb7a917b6010d099a6
-
SHA256
0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635
-
SHA512
a25da0ad6f451c09ec38c4711b8be6f2db4e6e656626bf4204c2af64887e7b7d89d85fe8d8f8360bf8f4e08a6481f9c34ff9cd592f6bf26fba5889326ff99570
Malware Config
Extracted
emotet
Epoch1
155.186.9.160:80
80.249.176.206:80
94.23.62.116:8080
59.148.253.194:8080
192.232.229.54:7080
46.101.58.37:8080
62.84.75.50:80
81.215.230.173:443
170.81.48.2:80
46.43.2.95:8080
1.226.84.243:8080
152.169.22.67:80
70.32.115.157:8080
73.51.245.231:8080
94.176.234.118:443
177.73.0.98:443
113.163.216.135:80
186.188.212.201:80
201.71.228.86:80
178.250.54.208:8080
110.39.162.2:443
178.242.90.32:80
181.58.181.9:80
77.78.196.173:443
5.196.35.138:7080
81.214.253.80:443
45.33.77.42:8080
178.211.45.66:8080
83.169.21.32:7080
190.101.156.139:80
83.103.179.156:80
201.213.177.139:80
190.64.88.186:443
85.214.26.7:8080
5.89.33.136:80
216.47.196.104:80
181.30.61.163:443
202.134.4.210:7080
181.120.29.49:80
181.61.182.143:80
87.106.46.107:8080
193.251.77.110:80
138.97.60.141:7080
80.15.100.37:80
60.249.78.226:8080
86.127.212.235:443
68.183.170.114:8080
5.2.182.7:80
149.202.72.142:7080
190.195.129.227:8090
70.32.84.74:8080
37.221.70.250:80
177.85.167.10:80
187.162.248.237:80
45.46.37.97:80
192.241.143.52:8080
105.209.235.113:8080
185.183.16.47:80
50.28.51.143:8080
128.92.203.42:80
37.187.161.206:8080
177.23.7.151:80
104.131.41.185:8080
24.232.228.233:80
103.236.179.162:80
82.208.149.146:80
12.162.84.2:8080
103.13.224.53:80
177.144.130.105:8080
78.206.229.130:80
74.58.215.226:80
51.255.165.160:8080
186.189.249.2:80
191.182.6.118:80
190.45.24.210:80
185.94.252.27:443
12.163.208.58:80
186.146.13.184:443
179.222.115.170:80
68.183.190.199:8080
138.97.60.140:8080
82.76.111.249:443
197.232.36.108:80
190.92.122.226:80
51.75.33.127:80
137.74.106.111:7080
60.93.23.51:80
190.24.243.186:80
209.236.123.42:8080
188.135.15.49:80
213.52.74.198:80
172.104.169.32:8080
187.162.250.23:443
45.16.226.117:443
213.197.182.158:8080
177.144.130.105:443
181.120.72.110:80
189.2.177.210:443
217.13.106.14:8080
219.92.13.25:80
212.71.237.140:8080
192.175.111.212:7080
51.15.7.145:80
190.115.18.139:8080
111.67.12.221:8080
46.105.114.137:8080
154.127.113.242:80
Signatures
-
suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M11
suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M11
-
resource yara_rule behavioral3/memory/1356-55-0x00000000002B0000-0x00000000002C2000-memory.dmp emotet behavioral3/memory/1356-59-0x0000000000350000-0x0000000000360000-memory.dmp emotet behavioral3/memory/1356-62-0x00000000002A0000-0x00000000002AF000-memory.dmp emotet behavioral3/memory/1516-66-0x0000000000390000-0x00000000003A2000-memory.dmp emotet behavioral3/memory/1516-70-0x00000000003B0000-0x00000000003C0000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 1516 prflbmsg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wlanutil\prflbmsg.exe 0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\notepad.exe 0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe File opened for modification C:\Windows\notepad.exe prflbmsg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1516 prflbmsg.exe 1516 prflbmsg.exe 1516 prflbmsg.exe 1516 prflbmsg.exe 1516 prflbmsg.exe 1516 prflbmsg.exe 1516 prflbmsg.exe 1516 prflbmsg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1356 0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1356 0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe 1516 prflbmsg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1516 1356 0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe 28 PID 1356 wrote to memory of 1516 1356 0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe 28 PID 1356 wrote to memory of 1516 1356 0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe 28 PID 1356 wrote to memory of 1516 1356 0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe"C:\Users\Admin\AppData\Local\Temp\0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\wlanutil\prflbmsg.exe"C:\Windows\SysWOW64\wlanutil\prflbmsg.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1516
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5f208db3d0b53573ddb865b8083297685
SHA1db379d053d1aec9c1f8be9cb7a917b6010d099a6
SHA2560ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635
SHA512a25da0ad6f451c09ec38c4711b8be6f2db4e6e656626bf4204c2af64887e7b7d89d85fe8d8f8360bf8f4e08a6481f9c34ff9cd592f6bf26fba5889326ff99570