Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2024 06:52

General

  • Target

    4da2827ce3f839ec9553ed43f8d930fb.exe

  • Size

    745KB

  • MD5

    4da2827ce3f839ec9553ed43f8d930fb

  • SHA1

    983e5f288040931bff241a9633889a7ba32a46d4

  • SHA256

    d6d347e6a73691e86122c143754923b7bfeec9ffaf5c24406324457c1d547098

  • SHA512

    ea3e7483e63ad730bad6897a19043f0e038c4eaa5a23ebac92bb1e3c7d7c1d65ccdbd1674bfa49df059c6fa884187311f7d7cc64a1908bcf68774c7cfec04ee7

  • SSDEEP

    12288:P1iuahDbW+ePQKTguan8z/SbGvfqepaLPvzp8AxNyYVcdYn2ntlJ0i3lA:P1iuUXAQK8ulSbGvUntbyYVcdYoE

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

1.215.28.101:8080

184.167.148.162:80

66.25.34.20:80

165.227.156.155:443

167.99.105.223:7080

67.225.179.64:8080

176.31.200.130:8080

190.220.19.82:443

91.242.138.5:443

159.65.25.128:8080

61.197.110.214:80

110.143.84.202:80

95.128.43.213:8080

91.73.197.90:80

201.184.105.242:443

108.179.206.219:8080

181.57.193.14:80

188.152.7.140:80

139.130.241.252:443

197.254.221.174:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4da2827ce3f839ec9553ed43f8d930fb.exe
    --c17c71e7
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:2664
  • C:\Users\Admin\AppData\Local\Temp\4da2827ce3f839ec9553ed43f8d930fb.exe
    "C:\Users\Admin\AppData\Local\Temp\4da2827ce3f839ec9553ed43f8d930fb.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
  • C:\Windows\SysWOW64\rdschunker.exe
    --50d4a28b
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2728
  • C:\Windows\SysWOW64\rdschunker.exe
    "C:\Windows\SysWOW64\rdschunker.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-5-0x00000000001E0000-0x00000000001F1000-memory.dmp
    Filesize

    68KB

  • memory/1684-0-0x0000000000200000-0x0000000000217000-memory.dmp
    Filesize

    92KB

  • memory/2664-6-0x00000000002E0000-0x00000000002F7000-memory.dmp
    Filesize

    92KB

  • memory/2728-16-0x00000000008F0000-0x0000000000907000-memory.dmp
    Filesize

    92KB

  • memory/2784-11-0x00000000003C0000-0x00000000003D7000-memory.dmp
    Filesize

    92KB