Analysis
-
max time kernel
127s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 06:28
Static task
static1
Behavioral task
behavioral1
Sample
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe
Resource
win7-20220718-en
General
-
Target
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe
-
Size
400KB
-
MD5
7332e39a8d45ca37ee9a767fa00ec90f
-
SHA1
026064006b987ed951ffce4f03c4394f557bf588
-
SHA256
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1
-
SHA512
443270e1050bf8beb5898455ebd5ad5605f870315c3a3fa3768629681c0c8891d754ca9a2a83ed4c61eec331aeb0ff69153f081b2d1c36ad7f38d5af515f3478
Malware Config
Extracted
emotet
Epoch1
189.129.4.186:80
189.244.245.238:80
79.127.57.42:80
207.180.208.175:8080
71.244.60.230:7080
119.59.124.163:8080
71.244.60.231:7080
104.236.243.129:8080
190.117.206.153:443
80.85.87.122:8080
77.245.101.134:8080
138.68.106.4:7080
187.155.233.46:443
190.230.60.129:80
200.21.90.6:8080
159.203.204.126:8080
181.188.149.134:80
62.75.143.100:7080
23.92.22.225:7080
183.87.87.73:80
201.163.74.202:443
200.57.102.71:8443
46.41.151.103:8080
217.113.27.158:443
109.104.79.48:8080
86.42.166.147:80
181.81.143.108:80
91.83.93.124:7080
217.199.175.216:8080
109.169.86.13:8080
183.82.97.25:80
5.196.35.138:7080
81.169.140.14:443
46.21.105.59:8080
190.200.64.180:7080
151.80.142.33:80
200.58.171.51:80
190.221.50.210:8080
123.168.4.66:22
198.199.106.229:8080
77.55.211.77:8080
88.250.223.190:8080
91.205.215.57:7080
190.1.37.125:443
203.25.159.3:8080
187.188.166.192:80
181.36.42.205:443
179.62.18.56:443
149.62.173.247:8080
79.143.182.254:8080
62.210.142.58:8080
50.28.51.143:8080
186.83.133.253:8080
178.79.163.131:8080
5.77.13.70:80
89.188.124.145:443
185.86.148.222:8080
190.19.42.131:80
51.15.8.192:8080
46.29.183.211:8080
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
nexttoner.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat nexttoner.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exenexttoner.exenexttoner.exedescription pid process target process PID 1768 set thread context of 1688 1768 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2004 set thread context of 2016 2004 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1192 set thread context of 1128 1192 nexttoner.exe nexttoner.exe PID 1164 set thread context of 1064 1164 nexttoner.exe nexttoner.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
nexttoner.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad nexttoner.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\WpadDecisionReason = "1" nexttoner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-9d-f8-8b-a5-59 nexttoner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\aa-9d-f8-8b-a5-59 nexttoner.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nexttoner.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" nexttoner.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nexttoner.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nexttoner.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-9d-f8-8b-a5-59\WpadDecisionReason = "1" nexttoner.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-9d-f8-8b-a5-59\WpadDecision = "0" nexttoner.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" nexttoner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings nexttoner.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\WpadDecisionTime = d078bb94cea4d801 nexttoner.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\WpadDecision = "0" nexttoner.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\WpadNetworkName = "Network 3" nexttoner.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-9d-f8-8b-a5-59\WpadDecisionTime = d078bb94cea4d801 nexttoner.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings nexttoner.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" nexttoner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455} nexttoner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nexttoner.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix nexttoner.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
nexttoner.exepid process 1064 nexttoner.exe 1064 nexttoner.exe 1064 nexttoner.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exenexttoner.exenexttoner.exepid process 1768 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 2004 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 1192 nexttoner.exe 1164 nexttoner.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exepid process 2016 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exenexttoner.exenexttoner.exepid process 1768 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 2004 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 1192 nexttoner.exe 1164 nexttoner.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exenexttoner.exenexttoner.exenexttoner.exedescription pid process target process PID 1768 wrote to memory of 1688 1768 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1768 wrote to memory of 1688 1768 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1768 wrote to memory of 1688 1768 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1768 wrote to memory of 1688 1768 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1768 wrote to memory of 1688 1768 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1688 wrote to memory of 2004 1688 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1688 wrote to memory of 2004 1688 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1688 wrote to memory of 2004 1688 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1688 wrote to memory of 2004 1688 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2004 wrote to memory of 2016 2004 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2004 wrote to memory of 2016 2004 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2004 wrote to memory of 2016 2004 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2004 wrote to memory of 2016 2004 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2004 wrote to memory of 2016 2004 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 1192 wrote to memory of 1128 1192 nexttoner.exe nexttoner.exe PID 1192 wrote to memory of 1128 1192 nexttoner.exe nexttoner.exe PID 1192 wrote to memory of 1128 1192 nexttoner.exe nexttoner.exe PID 1192 wrote to memory of 1128 1192 nexttoner.exe nexttoner.exe PID 1192 wrote to memory of 1128 1192 nexttoner.exe nexttoner.exe PID 1128 wrote to memory of 1164 1128 nexttoner.exe nexttoner.exe PID 1128 wrote to memory of 1164 1128 nexttoner.exe nexttoner.exe PID 1128 wrote to memory of 1164 1128 nexttoner.exe nexttoner.exe PID 1128 wrote to memory of 1164 1128 nexttoner.exe nexttoner.exe PID 1164 wrote to memory of 1064 1164 nexttoner.exe nexttoner.exe PID 1164 wrote to memory of 1064 1164 nexttoner.exe nexttoner.exe PID 1164 wrote to memory of 1064 1164 nexttoner.exe nexttoner.exe PID 1164 wrote to memory of 1064 1164 nexttoner.exe nexttoner.exe PID 1164 wrote to memory of 1064 1164 nexttoner.exe nexttoner.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe"C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe"C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe--1f35d5ed3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe--1f35d5ed4⤵
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\nexttoner.exe"C:\Windows\SysWOW64\nexttoner.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\nexttoner.exe"C:\Windows\SysWOW64\nexttoner.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\nexttoner.exe--8ef6ac833⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\nexttoner.exe--8ef6ac834⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_b7281fc7-5d8a-4f8d-86a4-0f15f7d0fba8Filesize
1KB
MD564059be6b8b4f743c4028e516c65c491
SHA154b877011745bedcb29495de9e73d945847f15a8
SHA256918e8d559e0bdf0883ae6c8f08c2882183056314cd89a1da79f86ecebff90b93
SHA5128008915ba1e1e6cf60ff01049c3765f73930eb4bd6c6e53561cc281398e1851aeb291e16c6bb5025881ebd3efb2fc5bdd8b852330c12b5347c79224eb6743978
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4084403625-2215941253-1760665084-1000\0f5007522459c86e95ffcc62f32308f1_b7281fc7-5d8a-4f8d-86a4-0f15f7d0fba8Filesize
1KB
MD51e0cfda0aafc8249137b533ab2585dbd
SHA14b7a22b0cf9840c0883bfd852d748a8b8bbc55d4
SHA25640a46d31c49c23e061a3d8fa17c094706912f01bd92b23089c92a90a44519142
SHA512877799a48bf1be555419dc2db82aac68e846e18fd13ede55835e748066dc87ae315b05e43d39e0a6f2cb3f0284e8507c3623cfaeb2be4d6c8a9fe0cdad84d1c4
-
memory/1064-83-0x000000000040D977-mapping.dmp
-
memory/1064-86-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1064-84-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1128-75-0x000000000040D977-mapping.dmp
-
memory/1164-76-0x0000000000000000-mapping.dmp
-
memory/1192-72-0x0000000000630000-0x0000000000644000-memory.dmpFilesize
80KB
-
memory/1688-61-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1688-58-0x000000000040D977-mapping.dmp
-
memory/1768-59-0x0000000000230000-0x0000000000243000-memory.dmpFilesize
76KB
-
memory/1768-54-0x0000000075871000-0x0000000075873000-memory.dmpFilesize
8KB
-
memory/1768-55-0x00000000003D0000-0x00000000003E4000-memory.dmpFilesize
80KB
-
memory/2004-60-0x0000000000000000-mapping.dmp
-
memory/2004-64-0x0000000000340000-0x0000000000354000-memory.dmpFilesize
80KB
-
memory/2016-77-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2016-70-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2016-68-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2016-67-0x000000000040D977-mapping.dmp