Overview
overview
10Static
static
82019-05-01...ts.zip
windows7-x64
12019-05-01...ts.zip
windows10-2004-x64
12019-05-01...ro.exe
windows7-x64
52019-05-01...ro.exe
windows10-2004-x64
102019-05-01...-2.exe
windows7-x64
102019-05-01...-2.exe
windows10-2004-x64
102019-05-01...-2.exe
windows7-x64
102019-05-01...-2.exe
windows10-2004-x64
102019-05-01...st.exe
windows7-x64
82019-05-01...st.exe
windows10-2004-x64
72019-05-01...nt.txt
windows7-x64
12019-05-01...nt.txt
windows10-2004-x64
12019-05-01...nt.txt
windows7-x64
12019-05-01...nt.txt
windows10-2004-x64
12019-05-01...19.doc
windows7-x64
102019-05-01...19.doc
windows10-2004-x64
102019-05-01...19.zip
windows7-x64
12019-05-01...19.zip
windows10-2004-x64
12019-05-01...tDll64
windows7-x64
12019-05-01...tDll64
windows10-2004-x64
12019-05-01...tDll64
windows7-x64
12019-05-01...tDll64
windows10-2004-x64
12019-05-01...s/dinj
windows7-x64
12019-05-01...s/dinj
windows10-2004-x64
12019-05-01.../dpost
windows7-x64
12019-05-01.../dpost
windows10-2004-x64
12019-05-01...s/sinj
windows7-x64
12019-05-01...s/sinj
windows10-2004-x64
12019-05-01...cher64
windows7-x64
12019-05-01...cher64
windows10-2004-x64
12019-05-01...ilconf
windows7-x64
12019-05-01...ilconf
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 00:28
Behavioral task
behavioral1
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-updated-after-initial-infection-2-of-2.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-updated-after-initial-infection-2-of-2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Trickbot-malware-retrieved-by-Emotet-infected-host.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Trickbot-malware-retrieved-by-Emotet-infected-host.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-registry-update-to-keep-Emotet-persistent.txt
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-registry-update-to-keep-Emotet-persistent.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-sched-task-to-keep-Trickbot-persistent.txt
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-sched-task-to-keep-Trickbot-persistent.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/40606534706_May_01_2019.doc
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/40606534706_May_01_2019.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/40606534706_May_01_2019.zip
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/40606534706_May_01_2019.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/importDll64
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/importDll64
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/dinj
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/dinj
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/dpost
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/dpost
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/sinj
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/injectDll64_configs/sinj
Resource
win10v2004-20230221-en
Behavioral task
behavioral29
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/mailsearcher64
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/mailsearcher64
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/mailsearcher64_configs/mailconf
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/GpuSettings/Data/mailsearcher64_configs/mailconf
Resource
win10v2004-20230220-en
General
-
Target
2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)/2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe
-
Size
168KB
-
MD5
1cc91941efd6d3da54a1054d9c9d870f
-
SHA1
b6531c99b2fb0c51941ac3a636c5c3cf69073f65
-
SHA256
6d7aff70a84d9237bde3b149ff04532cafb29b6f358886b5038a737af5934d1f
-
SHA512
bade1e20f1a892e33d20535235f0ed45b625ef8cdd1ba9a391f074d3b77f971fb63f68f6d0f97e51fa48ef211fa7bea76a56da9deb88c85dbd0aa892ae78ed69
-
SSDEEP
3072:5JYzFEhjHHIUjCgArLEZXApH3UHE360ESYUspf:r4FeHIU2Y9KEHE36FS2pf
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
relsound.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 relsound.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE relsound.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies relsound.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 relsound.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
relsound.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix relsound.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" relsound.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" relsound.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
relsound.exepid process 1200 relsound.exe 1200 relsound.exe 1200 relsound.exe 1200 relsound.exe 1200 relsound.exe 1200 relsound.exe 1200 relsound.exe 1200 relsound.exe 1200 relsound.exe 1200 relsound.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exepid process 1772 2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exerelsound.exedescription pid process target process PID 1668 wrote to memory of 1772 1668 2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe 2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe PID 1668 wrote to memory of 1772 1668 2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe 2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe PID 1668 wrote to memory of 1772 1668 2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe 2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe PID 4112 wrote to memory of 1200 4112 relsound.exe relsound.exe PID 4112 wrote to memory of 1200 4112 relsound.exe relsound.exe PID 4112 wrote to memory of 1200 4112 relsound.exe relsound.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)\2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe"C:\Users\Admin\AppData\Local\Temp\2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)\2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\2019-05-01-Emotet-and-Trickbot-malware-and-artifacts(1)\2019-05-01-Emotet-binary-updated-after-initial-infection-1-of-2.exe--48098e762⤵
- Suspicious behavior: RenamesItself
PID:1772
-
-
C:\Windows\SysWOW64\relsound.exe"C:\Windows\SysWOW64\relsound.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\relsound.exe--15f84482⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1200
-