Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 09:22
Static task
static1
Behavioral task
behavioral1
Sample
cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe
Resource
win7-20220718-en
General
-
Target
cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe
-
Size
254KB
-
MD5
7d1d9130324cf9994da0d01ea3420289
-
SHA1
e15c22dd2bb6926835ac94c467b9fee4af13ce4c
-
SHA256
cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be
-
SHA512
791fa9afc98bbbe52f1355a44b993a61b08593c680b9b77a49339b0cc73d0f2b73e29f66e6150cb374108820b39f9d23ac2abdbf751b2b91f0d99e9884fccc4c
Malware Config
Extracted
emotet
Epoch2
94.205.247.10:80
86.22.221.170:80
85.25.255.207:8080
185.94.252.13:443
94.177.216.217:8080
62.75.187.192:8080
78.24.219.147:8080
91.205.215.66:8080
24.45.195.162:7080
94.192.225.46:80
200.113.106.18:21
186.4.172.5:8080
104.131.44.150:8080
67.225.229.55:8080
190.226.44.20:21
92.233.128.13:143
5.196.74.210:8080
185.187.198.15:80
87.230.19.21:8080
186.176.138.171:7080
69.164.201.54:8080
186.4.172.5:443
86.98.25.30:53
85.54.169.141:8080
80.11.163.139:443
190.228.72.244:53
189.209.217.49:80
181.143.194.138:443
138.201.140.110:8080
187.144.61.73:443
46.105.131.87:80
206.189.98.125:8080
149.202.153.252:8080
104.131.11.150:8080
87.106.139.101:8080
59.103.164.174:80
198.199.114.69:8080
200.113.106.18:465
190.53.135.159:21
159.65.25.128:8080
169.239.182.217:8080
95.128.43.213:8080
144.139.247.220:80
190.145.67.134:8090
186.75.241.230:80
133.167.80.63:7080
136.243.177.26:8080
217.160.182.191:8080
27.4.80.183:443
37.157.194.134:443
92.222.216.44:8080
182.76.6.2:8080
162.241.208.52:8080
83.136.245.190:8080
31.12.67.62:7080
31.172.240.91:8080
200.71.148.138:8080
173.212.203.26:8080
103.39.131.88:80
200.51.94.251:80
222.214.218.192:8080
192.81.213.192:8080
201.251.43.69:8080
181.143.53.227:21
104.236.246.93:8080
167.71.10.37:8080
182.176.132.213:8090
87.106.136.232:8080
27.147.163.188:8080
212.71.234.16:8080
178.79.161.166:443
124.240.198.66:80
85.104.59.244:20
47.41.213.2:22
152.89.236.214:8080
115.78.95.230:443
45.33.49.124:443
211.63.71.72:8080
80.11.163.139:21
190.211.207.11:443
186.4.172.5:20
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
pagecube.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 pagecube.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 pagecube.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pagecube.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies pagecube.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
pagecube.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix pagecube.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" pagecube.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" pagecube.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
pagecube.exepid process 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe 712 pagecube.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exepid process 4624 cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.execd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exepagecube.exepagecube.exepid process 2052 cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe 2052 cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe 4624 cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe 4624 cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe 3264 pagecube.exe 3264 pagecube.exe 712 pagecube.exe 712 pagecube.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exepagecube.exedescription pid process target process PID 2052 wrote to memory of 4624 2052 cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe PID 2052 wrote to memory of 4624 2052 cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe PID 2052 wrote to memory of 4624 2052 cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe PID 3264 wrote to memory of 712 3264 pagecube.exe pagecube.exe PID 3264 wrote to memory of 712 3264 pagecube.exe pagecube.exe PID 3264 wrote to memory of 712 3264 pagecube.exe pagecube.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe"C:\Users\Admin\AppData\Local\Temp\cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cd6b282ea4a3eb298035f6db29f8e6dfb24253f897120015b0c10dd0192084be.exe--1921ea092⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\pagecube.exe"C:\Windows\SysWOW64\pagecube.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\pagecube.exe--dfae74962⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/712-147-0x0000000000000000-mapping.dmp
-
memory/712-148-0x0000000000A50000-0x0000000000A64000-memory.dmpFilesize
80KB
-
memory/2052-130-0x00000000023C0000-0x00000000023D4000-memory.dmpFilesize
80KB
-
memory/2052-136-0x0000000000C00000-0x0000000000C0F000-memory.dmpFilesize
60KB
-
memory/3264-142-0x0000000000AA0000-0x0000000000AB4000-memory.dmpFilesize
80KB
-
memory/4624-135-0x0000000000000000-mapping.dmp
-
memory/4624-137-0x0000000002170000-0x0000000002184000-memory.dmpFilesize
80KB