Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 06:28
Static task
static1
Behavioral task
behavioral1
Sample
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe
Resource
win7-20220718-en
General
-
Target
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe
-
Size
400KB
-
MD5
7332e39a8d45ca37ee9a767fa00ec90f
-
SHA1
026064006b987ed951ffce4f03c4394f557bf588
-
SHA256
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1
-
SHA512
443270e1050bf8beb5898455ebd5ad5605f870315c3a3fa3768629681c0c8891d754ca9a2a83ed4c61eec331aeb0ff69153f081b2d1c36ad7f38d5af515f3478
Malware Config
Extracted
emotet
Epoch1
189.129.4.186:80
189.244.245.238:80
79.127.57.42:80
207.180.208.175:8080
71.244.60.230:7080
119.59.124.163:8080
71.244.60.231:7080
104.236.243.129:8080
190.117.206.153:443
80.85.87.122:8080
77.245.101.134:8080
138.68.106.4:7080
187.155.233.46:443
190.230.60.129:80
200.21.90.6:8080
159.203.204.126:8080
181.188.149.134:80
62.75.143.100:7080
23.92.22.225:7080
183.87.87.73:80
201.163.74.202:443
200.57.102.71:8443
46.41.151.103:8080
217.113.27.158:443
109.104.79.48:8080
86.42.166.147:80
181.81.143.108:80
91.83.93.124:7080
217.199.175.216:8080
109.169.86.13:8080
183.82.97.25:80
5.196.35.138:7080
81.169.140.14:443
46.21.105.59:8080
190.200.64.180:7080
151.80.142.33:80
200.58.171.51:80
190.221.50.210:8080
123.168.4.66:22
198.199.106.229:8080
77.55.211.77:8080
88.250.223.190:8080
91.205.215.57:7080
190.1.37.125:443
203.25.159.3:8080
187.188.166.192:80
181.36.42.205:443
179.62.18.56:443
149.62.173.247:8080
79.143.182.254:8080
62.210.142.58:8080
50.28.51.143:8080
186.83.133.253:8080
178.79.163.131:8080
5.77.13.70:80
89.188.124.145:443
185.86.148.222:8080
190.19.42.131:80
51.15.8.192:8080
46.29.183.211:8080
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
drawatoner.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 drawatoner.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE drawatoner.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies drawatoner.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 drawatoner.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exedrawatoner.exedrawatoner.exedescription pid process target process PID 8 set thread context of 3764 8 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2260 set thread context of 1504 2260 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 3184 set thread context of 1176 3184 drawatoner.exe drawatoner.exe PID 4824 set thread context of 5108 4824 drawatoner.exe drawatoner.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
drawatoner.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix drawatoner.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" drawatoner.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" drawatoner.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
drawatoner.exepid process 5108 drawatoner.exe 5108 drawatoner.exe 5108 drawatoner.exe 5108 drawatoner.exe 5108 drawatoner.exe 5108 drawatoner.exe 5108 drawatoner.exe 5108 drawatoner.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exedrawatoner.exedrawatoner.exepid process 8 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 2260 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 3184 drawatoner.exe 4824 drawatoner.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exepid process 1504 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exedrawatoner.exedrawatoner.exepid process 8 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 2260 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 3184 drawatoner.exe 4824 drawatoner.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exedrawatoner.exedrawatoner.exedrawatoner.exedescription pid process target process PID 8 wrote to memory of 3764 8 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 8 wrote to memory of 3764 8 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 8 wrote to memory of 3764 8 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 8 wrote to memory of 3764 8 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 3764 wrote to memory of 2260 3764 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 3764 wrote to memory of 2260 3764 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 3764 wrote to memory of 2260 3764 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2260 wrote to memory of 1504 2260 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2260 wrote to memory of 1504 2260 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2260 wrote to memory of 1504 2260 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 2260 wrote to memory of 1504 2260 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe 8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe PID 3184 wrote to memory of 1176 3184 drawatoner.exe drawatoner.exe PID 3184 wrote to memory of 1176 3184 drawatoner.exe drawatoner.exe PID 3184 wrote to memory of 1176 3184 drawatoner.exe drawatoner.exe PID 3184 wrote to memory of 1176 3184 drawatoner.exe drawatoner.exe PID 1176 wrote to memory of 4824 1176 drawatoner.exe drawatoner.exe PID 1176 wrote to memory of 4824 1176 drawatoner.exe drawatoner.exe PID 1176 wrote to memory of 4824 1176 drawatoner.exe drawatoner.exe PID 4824 wrote to memory of 5108 4824 drawatoner.exe drawatoner.exe PID 4824 wrote to memory of 5108 4824 drawatoner.exe drawatoner.exe PID 4824 wrote to memory of 5108 4824 drawatoner.exe drawatoner.exe PID 4824 wrote to memory of 5108 4824 drawatoner.exe drawatoner.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe"C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe"C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe--1f35d5ed3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8deb508a95178d159b43da93160ff6d64c5ad468f1f91e222021eba9292954a1.exe--1f35d5ed4⤵
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\drawatoner.exe"C:\Windows\SysWOW64\drawatoner.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\drawatoner.exe"C:\Windows\SysWOW64\drawatoner.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\drawatoner.exe--ce5d77553⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\drawatoner.exe--ce5d77554⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\2586c361c08b9f9af8674ef9a6c9f2d7_e2a67401-6492-4cbf-87ab-b664c084dadaFilesize
1KB
MD5f77c474ac607e3f4937875d2cc3baa59
SHA1fbb230e37579aba29875a3f4b34e4f9a1fe744a7
SHA2568b7ad0cf4b3ae161497d03ffb603cb9a7efd73afa76cad810a6e48909b31d6f0
SHA5123d6946437f7f4db8978f51e619e5c29eb1703aa5587f88fbb7d34579b5f10901057a20a638ec8598096d62f7fe96fa8a24ee26fd9700b3c4c40f4d18f9cc6748
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2372564722-193526734-2636556182-1000\0f5007522459c86e95ffcc62f32308f1_e2a67401-6492-4cbf-87ab-b664c084dadaFilesize
1KB
MD592ed80f0662dd5ae39bdc76b37aab6cf
SHA1b6515a49efd08d008b0cfd23f4fe6be822fbd2e8
SHA2564883d27eb706118515bffbeea43544ac5cab001196574f9b4884a3e7b6938376
SHA512162fafba54f3cb18d1ccdc487771d3ad5a2800402ae925989eba3c3a5d5b2cc429c925aa78e23e62a5808b383973e7afc3b6cc8a26b5d08ac5ed95ead3df5dcb
-
memory/8-134-0x0000000002270000-0x0000000002283000-memory.dmpFilesize
76KB
-
memory/8-130-0x00000000022B0000-0x00000000022C4000-memory.dmpFilesize
80KB
-
memory/1176-147-0x0000000000000000-mapping.dmp
-
memory/1504-149-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1504-141-0x0000000000000000-mapping.dmp
-
memory/1504-142-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1504-143-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2260-135-0x0000000000000000-mapping.dmp
-
memory/2260-138-0x00000000025D0000-0x00000000025E4000-memory.dmpFilesize
80KB
-
memory/3184-144-0x0000000000E20000-0x0000000000E34000-memory.dmpFilesize
80KB
-
memory/3764-136-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/3764-133-0x0000000000000000-mapping.dmp
-
memory/4824-148-0x0000000000000000-mapping.dmp
-
memory/4824-151-0x0000000000DE0000-0x0000000000DF4000-memory.dmpFilesize
80KB
-
memory/5108-154-0x0000000000000000-mapping.dmp
-
memory/5108-155-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/5108-156-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB