Analysis
-
max time kernel
148s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 07:00
Static task
static1
Behavioral task
behavioral1
Sample
4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe
Resource
win7-20220414-en
General
-
Target
4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe
-
Size
516KB
-
MD5
f7a31719c91770d2f7f945c5acba4116
-
SHA1
ac2162d2ae066bf9067ad7f8bf3697a78154ea68
-
SHA256
4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29
-
SHA512
1375dced5b7a646461d632d7069d40d69aaca2e008f16f6bbcb22ea8304ebaaa6f8d26d05da45dbe3c79b89fea9e3c048da5bd3c8823eafe7bb7376182b6a38d
Malware Config
Extracted
emotet
Epoch2
190.18.146.70:80
187.147.50.167:8080
80.11.163.139:21
178.254.6.27:7080
92.222.125.16:7080
142.44.162.209:8080
31.12.67.62:7080
45.123.3.54:443
201.250.11.236:50000
41.220.119.246:80
86.98.25.30:53
37.157.194.134:443
187.144.189.58:50000
189.209.217.49:80
31.172.240.91:8080
104.131.11.150:8080
59.152.93.46:443
190.53.135.159:21
222.214.218.192:8080
162.243.125.212:8080
169.239.182.217:8080
85.104.59.244:20
95.128.43.213:8080
190.226.44.20:21
91.92.191.134:8080
144.139.247.220:80
87.230.19.21:8080
117.197.124.36:443
173.212.203.26:8080
206.189.98.125:8080
45.33.49.124:443
62.75.187.192:8080
136.243.177.26:8080
91.205.215.66:8080
186.4.172.5:443
185.129.92.210:7080
182.176.132.213:8090
87.106.139.101:8080
87.106.136.232:8080
188.166.253.46:8080
186.4.194.153:993
37.208.39.59:7080
185.94.252.13:443
175.100.138.82:22
78.24.219.147:8080
201.212.57.109:80
217.160.182.191:8080
186.4.172.5:8080
103.97.95.218:143
138.201.140.110:8080
182.76.6.2:8080
190.145.67.134:8090
47.41.213.2:22
159.65.25.128:8080
75.127.14.170:8080
190.201.164.223:53
94.205.247.10:80
78.188.105.159:21
177.246.193.139:20
149.202.153.252:8080
88.156.97.210:80
178.79.161.166:443
46.105.131.87:80
211.63.71.72:8080
179.32.19.219:22
190.186.203.55:80
104.236.246.93:8080
92.222.216.44:8080
212.71.234.16:8080
182.176.106.43:995
181.143.53.227:21
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
xinputmail.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat xinputmail.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exexinputmail.exexinputmail.exedescription pid process target process PID 1776 set thread context of 828 1776 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1716 set thread context of 1688 1716 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 880 set thread context of 652 880 xinputmail.exe xinputmail.exe PID 1364 set thread context of 1568 1364 xinputmail.exe xinputmail.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
xinputmail.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix xinputmail.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" xinputmail.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" xinputmail.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 xinputmail.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 xinputmail.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad xinputmail.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" xinputmail.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A8FF4CB0-B4C1-4761-AFCE-DB39EA3AE147} xinputmail.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A8FF4CB0-B4C1-4761-AFCE-DB39EA3AE147}\WpadDecisionReason = "1" xinputmail.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A8FF4CB0-B4C1-4761-AFCE-DB39EA3AE147}\WpadNetworkName = "Network 3" xinputmail.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-9a-38-64-80-61 xinputmail.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-9a-38-64-80-61\WpadDecision = "0" xinputmail.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings xinputmail.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings xinputmail.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 xinputmail.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A8FF4CB0-B4C1-4761-AFCE-DB39EA3AE147}\WpadDecisionTime = 5004949e348dd801 xinputmail.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A8FF4CB0-B4C1-4761-AFCE-DB39EA3AE147}\WpadDecision = "0" xinputmail.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A8FF4CB0-B4C1-4761-AFCE-DB39EA3AE147}\02-9a-38-64-80-61 xinputmail.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-9a-38-64-80-61\WpadDecisionReason = "1" xinputmail.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-9a-38-64-80-61\WpadDecisionTime = 5004949e348dd801 xinputmail.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections xinputmail.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
xinputmail.exepid process 1568 xinputmail.exe 1568 xinputmail.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exexinputmail.exexinputmail.exepid process 1776 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 1716 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 880 xinputmail.exe 1364 xinputmail.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exepid process 1688 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exexinputmail.exexinputmail.exepid process 1776 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 1716 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 880 xinputmail.exe 1364 xinputmail.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exexinputmail.exexinputmail.exexinputmail.exedescription pid process target process PID 1776 wrote to memory of 828 1776 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1776 wrote to memory of 828 1776 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1776 wrote to memory of 828 1776 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1776 wrote to memory of 828 1776 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1776 wrote to memory of 828 1776 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 828 wrote to memory of 1716 828 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 828 wrote to memory of 1716 828 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 828 wrote to memory of 1716 828 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 828 wrote to memory of 1716 828 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1716 wrote to memory of 1688 1716 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1716 wrote to memory of 1688 1716 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1716 wrote to memory of 1688 1716 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1716 wrote to memory of 1688 1716 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 1716 wrote to memory of 1688 1716 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe 4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe PID 880 wrote to memory of 652 880 xinputmail.exe xinputmail.exe PID 880 wrote to memory of 652 880 xinputmail.exe xinputmail.exe PID 880 wrote to memory of 652 880 xinputmail.exe xinputmail.exe PID 880 wrote to memory of 652 880 xinputmail.exe xinputmail.exe PID 880 wrote to memory of 652 880 xinputmail.exe xinputmail.exe PID 652 wrote to memory of 1364 652 xinputmail.exe xinputmail.exe PID 652 wrote to memory of 1364 652 xinputmail.exe xinputmail.exe PID 652 wrote to memory of 1364 652 xinputmail.exe xinputmail.exe PID 652 wrote to memory of 1364 652 xinputmail.exe xinputmail.exe PID 1364 wrote to memory of 1568 1364 xinputmail.exe xinputmail.exe PID 1364 wrote to memory of 1568 1364 xinputmail.exe xinputmail.exe PID 1364 wrote to memory of 1568 1364 xinputmail.exe xinputmail.exe PID 1364 wrote to memory of 1568 1364 xinputmail.exe xinputmail.exe PID 1364 wrote to memory of 1568 1364 xinputmail.exe xinputmail.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe"C:\Users\Admin\AppData\Local\Temp\4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe"C:\Users\Admin\AppData\Local\Temp\4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe--2a94fb313⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4d8acd99b8e8b1e40b64b35dcee753a3f9073847ec1e8957e793dab849140c29.exe--2a94fb314⤵
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\xinputmail.exe"C:\Windows\SysWOW64\xinputmail.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\xinputmail.exe"C:\Windows\SysWOW64\xinputmail.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\xinputmail.exe--e16d003b3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\xinputmail.exe--e16d003b4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_4cab856c-2ae4-4cbd-8a04-329969ee64daFilesize
1KB
MD572ccd02fb3698e1160d7254bdd1ab540
SHA12cf4030ab2b227248fc4cbfbdb6a6b1058afe18b
SHA25602e18e27033ca28e0974b35c6204167bd54837cb5aef56047b9f10f07476ed50
SHA51292827aa9790cd73315101f0911767a76348c1b5f88e7a09e01d506a7bda8f8885d58776ebfbcc44befb6afdbde1afe043d1a6cb33ec45dfcbcb972b0fa2fb6d1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2277218442-1199762539-2004043321-1000\0f5007522459c86e95ffcc62f32308f1_4cab856c-2ae4-4cbd-8a04-329969ee64daFilesize
1KB
MD5cb0c48e49486766cc5e3d2e5bc8dfa9c
SHA1f1f04725015775f75fa7223a0508e1eb1a2d99e9
SHA2568d24c1f57b7168a7ea5398ddcbf5ac22a4fc5c8ed9b7e54350337eefc6796d8f
SHA5125bfc0e06ea8774c485e4484fbe8f7d90ddc8b8662d9bf56d7703bcd13f418c18f61adfcee4bfaeb21c4a32e5cf71a10e96e15475dcd8b7509284859901f71ab8
-
memory/652-75-0x000000000040F072-mapping.dmp
-
memory/828-59-0x000000000040F072-mapping.dmp
-
memory/828-61-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/880-72-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/1364-80-0x0000000000A50000-0x0000000000A66000-memory.dmpFilesize
88KB
-
memory/1364-76-0x0000000000000000-mapping.dmp
-
memory/1568-86-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/1568-84-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/1568-83-0x000000000040F072-mapping.dmp
-
memory/1688-70-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/1688-68-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/1688-77-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/1688-67-0x000000000040F072-mapping.dmp
-
memory/1716-64-0x00000000003B0000-0x00000000003C6000-memory.dmpFilesize
88KB
-
memory/1716-60-0x0000000000000000-mapping.dmp
-
memory/1776-54-0x00000000754A1000-0x00000000754A3000-memory.dmpFilesize
8KB
-
memory/1776-58-0x0000000000240000-0x0000000000255000-memory.dmpFilesize
84KB
-
memory/1776-55-0x00000000002A0000-0x00000000002B6000-memory.dmpFilesize
88KB