Behavioral task
behavioral1
Sample
ffbcf5e11564aa99ec6b8b6686fd02f9ef65ba1a5929e180d46b9bc3da3aa5dc.exe
Resource
win7-20220414-en
General
-
Target
ffbcf5e11564aa99ec6b8b6686fd02f9ef65ba1a5929e180d46b9bc3da3aa5dc
-
Size
81KB
-
MD5
71c50c8e9b397f5c411eef6a4bcfd95e
-
SHA1
d673dba48390fa8d87cb5cb0318aed397a0382d4
-
SHA256
ffbcf5e11564aa99ec6b8b6686fd02f9ef65ba1a5929e180d46b9bc3da3aa5dc
-
SHA512
7c265b82dbec012de0aa8aad45d2f6d09e51fd0f7614bb0cec6bf046ac3b84306acdab4c2257772629bd333781e94dc0663a5daff1377db5b5b91af7b8044623
-
SSDEEP
1536:RQ14LR8spFrd2kxP9GkYsPHmmXZxhDVSQo/l7xmGzFBnOQi8sVJTcWYWLWY:2+8sLd2kJ9GSZjhSz/l7cGhEQiJ3wWL
Malware Config
Extracted
emotet
Epoch2
149.167.86.174:990
181.164.8.25:80
181.143.194.138:443
192.241.250.202:8080
63.142.253.122:8080
178.254.6.27:7080
92.222.125.16:7080
142.44.162.209:8080
86.98.25.30:53
31.172.240.91:8080
149.202.153.252:8080
201.250.11.236:50000
189.129.231.76:20
182.76.6.2:8080
189.209.217.49:80
87.106.136.232:8080
91.205.215.66:8080
212.71.234.16:8080
178.79.161.166:443
162.243.125.212:8080
173.212.203.26:8080
85.104.59.244:20
186.4.172.5:8080
169.239.182.217:8080
37.157.194.134:443
190.18.146.70:80
87.230.19.21:8080
186.4.172.5:443
103.97.95.218:143
206.189.98.125:8080
181.143.53.227:21
185.94.252.13:443
190.145.67.134:8090
136.243.177.26:8080
94.205.247.10:80
95.128.43.213:8080
159.65.25.128:8080
222.214.218.192:8080
104.236.246.93:8080
217.160.182.191:8080
59.152.93.46:443
138.201.140.110:8080
45.33.49.124:443
78.188.105.159:21
92.222.216.44:8080
185.129.92.210:7080
47.41.213.2:22
144.139.247.220:80
46.105.131.87:80
62.75.187.192:8080
88.156.97.210:80
177.246.193.139:20
188.166.253.46:8080
80.11.163.139:21
41.220.119.246:80
31.12.67.62:7080
45.123.3.54:443
179.32.19.219:22
190.226.44.20:21
87.106.139.101:8080
182.176.132.213:8090
190.201.164.223:53
190.53.135.159:21
78.24.219.147:8080
5.196.74.210:8080
37.208.39.59:7080
187.144.189.58:50000
190.106.97.230:443
186.75.241.230:80
182.176.106.43:995
175.100.138.82:22
190.186.203.55:80
91.92.191.134:8080
211.63.71.72:8080
104.131.11.150:8080
186.4.194.153:993
Signatures
-
Emotet family
Files
-
ffbcf5e11564aa99ec6b8b6686fd02f9ef65ba1a5929e180d46b9bc3da3aa5dc.exe windows x86
76e325c37944c099823b0759fa87484e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsProcessorFeaturePresent
CreateMutexW
lstrcpynW
WaitForSingleObject
CreateProcessW
CreateEventW
ResetEvent
GetCurrentProcessId
CopyFileW
GetTempPathW
Wow64DisableWow64FsRedirection
GetTempFileNameW
VirtualAlloc
SetFilePointer
CreateFileW
SetLastError
lstrcmpiW
Process32NextW
GetVolumeInformationW
lstrcpyW
UnlockFileEx
VirtualFree
SetFileAttributesW
VirtualQueryEx
Wow64RevertWow64FsRedirection
GetNativeSystemInfo
LoadLibraryA
TerminateProcess
WriteFile
LoadLibraryW
ReleaseMutex
lstrlen
CreateDirectoryW
GetFileAttributesW
GetThreadContext
HeapAlloc
lstrlenW
SignalObjectAndWait
GetCurrentProcess
Sleep
CreateThread
GetComputerNameW
ExitProcess
FreeLibrary
SetThreadContext
WideCharToMultiByte
VirtualAllocEx
VirtualProtectEx
WTSGetActiveConsoleSessionId
MultiByteToWideChar
CloseHandle
GetTickCount
GetProcessHeap
ResumeThread
GetModuleFileNameW
lstrcatW
UnmapViewOfFile
SetEvent
GetLastError
GetWindowsDirectoryW
GetFileSize
CreateFileMappingW
ProcessIdToSessionId
WriteProcessMemory
LockFileEx
DeleteFileW
MapViewOfFile
GetProcAddress
GetCommandLineW
CreateToolhelp32Snapshot
SetErrorMode
IsWow64Process
HeapFree
FlushFileBuffers
MoveFileExW
GetCurrentThreadId
LocalFree
Process32FirstW
GetLocalTime
HeapReAlloc
GetModuleHandleW
advapi32
AdjustTokenPrivileges
RegisterServiceCtrlHandlerExW
CryptImportKey
CryptReleaseContext
CreateProcessAsUserW
OpenSCManagerW
CryptVerifySignatureW
EnumServicesStatusExW
LookupPrivilegeValueW
CryptExportKey
DuplicateTokenEx
RegCreateKeyExW
CryptAcquireContextW
CryptCreateHash
CryptDecrypt
CryptEncrypt
StartServiceW
SetServiceStatus
OpenProcessToken
StartServiceCtrlDispatcherW
ImpersonateLoggedOnUser
GetServiceDisplayNameW
CryptGenKey
CryptDestroyKey
CryptDuplicateHash
GetTokenInformation
DuplicateToken
RevertToSelf
RegQueryValueExW
CreateServiceW
ChangeServiceConfig2W
CryptGetHashParam
RegSetValueExW
RegCloseKey
OpenServiceW
CloseServiceHandle
QueryServiceConfig2W
DeleteService
CryptDestroyHash
GetLengthSid
crypt32
CryptDecodeObjectEx
ntdll
RtlGetVersion
_snwprintf
RtlComputeCrc32
_vsnprintf
memset
_vsnwprintf
_snprintf
NtUnmapViewOfSection
memcpy
shell32
SHGetFolderPathW
SHFileOperationW
urlmon
ObtainUserAgentString
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wininet
HttpSendRequestW
InternetReadFile
InternetCloseHandle
HttpQueryInfoW
InternetConnectW
InternetReadFileExA
HttpOpenRequestW
InternetSetOptionW
HttpSendRequestExA
InternetCrackUrlW
InternetReadFileExW
HttpEndRequestW
InternetQueryOptionW
InternetSetStatusCallbackW
InternetOpenW
wtsapi32
QueryUserToken
WTSEnumerateSessionsW
WTSFreeMemory
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ