Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
ca13e5376702f5b2d761ffb816b1cd27.exe
Resource
win7-20240221-en
General
-
Target
ca13e5376702f5b2d761ffb816b1cd27.exe
-
Size
556KB
-
MD5
ca13e5376702f5b2d761ffb816b1cd27
-
SHA1
4f11b9b8e8ffb34908aa3ab18af13a43e1b1dc86
-
SHA256
e787dba061d08479637fc625bb901d4c8730bf5af3d079776f0c12a37ca8562f
-
SHA512
4f1828dda7336e40bd2f539f30ebe22a2bb0da409798f0d440137f919da38a0454ee785a62abaed21c37a969ff4bd6214f22cb195bd7fb079f6b41584a184634
-
SSDEEP
12288:ubFmNHloUQYbEZpakjYDJA1zpYDwUeiRjPjMZ:rHNQYbuDj6SfKjPG
Malware Config
Extracted
emotet
Epoch1
109.166.89.91:80
200.71.193.220:443
118.200.218.193:443
104.236.137.72:8080
172.104.233.225:8080
213.189.36.51:8080
85.234.143.94:8080
68.183.190.199:8080
5.196.35.138:7080
96.20.84.254:7080
69.163.33.84:8080
207.154.204.40:8080
2.38.99.79:80
50.28.51.143:8080
189.173.113.67:443
181.135.153.203:443
134.209.214.126:8080
62.75.143.100:7080
182.48.194.6:8090
86.42.166.147:80
186.15.83.52:8080
138.68.106.4:7080
104.131.58.132:8080
203.25.159.3:8080
116.48.138.115:80
163.172.40.218:7080
200.124.225.32:80
144.139.56.105:80
119.59.124.163:8080
178.79.163.131:8080
190.146.131.105:8080
212.71.237.140:8080
77.55.211.77:8080
185.86.148.222:8080
181.61.143.177:80
186.0.68.43:8443
183.82.97.25:80
91.205.215.57:7080
200.123.101.90:80
217.199.160.224:8080
77.241.53.234:80
186.68.48.204:443
181.231.62.54:80
190.210.184.138:995
80.85.87.122:8080
190.102.226.91:80
45.79.95.107:443
121.175.14.59:990
142.127.57.63:8080
139.5.237.27:443
87.106.77.40:7080
187.190.49.92:443
149.62.173.247:8080
62.75.160.178:8080
181.36.42.205:443
98.196.49.107:80
190.16.101.10:80
190.38.14.52:80
201.190.133.235:8080
46.28.111.142:7080
91.204.163.19:8090
86.142.102.191:8443
190.195.129.227:8090
200.58.83.179:80
190.4.50.26:80
51.255.165.160:8080
110.143.18.92:80
109.169.86.13:8080
81.213.215.216:50000
200.113.106.18:80
95.219.199.225:80
142.93.114.137:8080
87.118.70.69:8080
201.213.32.59:80
154.120.227.206:8080
91.83.93.124:7080
47.187.70.124:443
85.130.127.2:80
203.130.0.69:80
46.101.212.195:8080
82.196.15.205:8080
190.97.30.167:990
68.183.170.114:8080
125.99.61.162:7080
80.29.54.20:80
190.17.42.79:80
159.203.204.126:8080
191.103.76.34:443
14.160.93.230:80
88.250.223.190:8080
201.163.74.202:443
190.186.164.23:80
181.198.203.45:443
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat printschunker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" printschunker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings printschunker.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-cb-7e-1e-58-a7 printschunker.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-cb-7e-1e-58-a7\WpadDecisionReason = "1" printschunker.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 printschunker.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D3825C1-197E-4328-ACC9-053113537B39} printschunker.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-cb-7e-1e-58-a7\WpadDecisionTime = 0067a9ce7376da01 printschunker.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix printschunker.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D3825C1-197E-4328-ACC9-053113537B39}\WpadDecisionReason = "1" printschunker.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D3825C1-197E-4328-ACC9-053113537B39}\06-cb-7e-1e-58-a7 printschunker.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-cb-7e-1e-58-a7\WpadDecision = "0" printschunker.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings printschunker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections printschunker.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 printschunker.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" printschunker.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" printschunker.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 printschunker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad printschunker.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D3825C1-197E-4328-ACC9-053113537B39}\WpadDecisionTime = 0067a9ce7376da01 printschunker.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D3825C1-197E-4328-ACC9-053113537B39}\WpadDecision = "0" printschunker.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D3825C1-197E-4328-ACC9-053113537B39}\WpadNetworkName = "Network 3" printschunker.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2640 printschunker.exe 2640 printschunker.exe 2640 printschunker.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2188 ca13e5376702f5b2d761ffb816b1cd27.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1244 ca13e5376702f5b2d761ffb816b1cd27.exe 2188 ca13e5376702f5b2d761ffb816b1cd27.exe 2552 printschunker.exe 2640 printschunker.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2188 1244 ca13e5376702f5b2d761ffb816b1cd27.exe 28 PID 1244 wrote to memory of 2188 1244 ca13e5376702f5b2d761ffb816b1cd27.exe 28 PID 1244 wrote to memory of 2188 1244 ca13e5376702f5b2d761ffb816b1cd27.exe 28 PID 1244 wrote to memory of 2188 1244 ca13e5376702f5b2d761ffb816b1cd27.exe 28 PID 2552 wrote to memory of 2640 2552 printschunker.exe 30 PID 2552 wrote to memory of 2640 2552 printschunker.exe 30 PID 2552 wrote to memory of 2640 2552 printschunker.exe 30 PID 2552 wrote to memory of 2640 2552 printschunker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca13e5376702f5b2d761ffb816b1cd27.exe"C:\Users\Admin\AppData\Local\Temp\ca13e5376702f5b2d761ffb816b1cd27.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\ca13e5376702f5b2d761ffb816b1cd27.exe--c27f1cb82⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
C:\Windows\SysWOW64\printschunker.exe"C:\Windows\SysWOW64\printschunker.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\printschunker.exe--4e948aaa2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2640
-