Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
ExeFile (233).exe
Resource
win7-20240729-en
General
-
Target
ExeFile (233).exe
-
Size
460KB
-
MD5
59287b19f7d85e749d19a57337103045
-
SHA1
9de93499becd7a7501db4895d934d8792e7c91c8
-
SHA256
c19a014a1cdf25ec6441d305376dfe78b5c20ada7494fbc4aa2d6f68631df3d9
-
SHA512
655d2a9259a6d075320f18d46c5ba294504b9385a4b8533f79288c40a0b022cd7d6d35201336dfc0bbb5c0cf957e709b94feb1ee1402d1bff3668bd8163b7192
-
SSDEEP
12288:UOps+brP/VgjVbKTrOhkfq8eKYmC3LC2:bs+vPN0b1ywLC2
Malware Config
Extracted
emotet
Epoch2
88.153.35.32:80
107.170.146.252:8080
173.212.214.235:7080
167.114.153.111:8080
67.170.250.203:443
121.124.124.40:7080
103.86.49.11:8080
74.214.230.200:80
194.187.133.160:443
172.104.97.173:8080
172.91.208.86:80
200.116.145.225:443
202.134.4.216:8080
172.105.13.66:443
190.164.104.62:80
50.35.17.13:80
176.111.60.55:8080
201.241.127.190:80
66.76.12.94:8080
95.213.236.64:8080
194.4.58.192:7080
62.171.142.179:8080
79.137.83.50:443
190.108.228.27:443
120.150.218.241:443
218.147.193.146:80
176.113.52.6:443
24.178.90.49:80
123.176.25.234:80
138.68.87.218:443
194.190.67.75:80
203.153.216.189:7080
102.182.93.220:80
37.139.21.175:8080
50.91.114.38:80
154.91.33.137:443
97.82.79.83:80
75.143.247.51:80
71.15.245.148:8080
89.121.205.18:80
209.54.13.14:80
47.36.140.164:80
27.114.9.93:80
104.131.11.150:443
24.133.106.23:80
49.50.209.131:80
174.106.122.139:80
2.58.16.89:8080
157.245.99.39:8080
137.59.187.107:8080
220.245.198.194:80
61.33.119.226:443
190.29.166.0:80
62.75.141.82:80
112.185.64.233:80
61.19.246.238:443
186.70.56.94:443
37.187.72.193:8080
190.240.194.77:443
108.46.29.236:80
118.83.154.64:443
121.7.31.214:80
216.139.123.119:80
91.146.156.228:80
119.59.116.21:8080
89.216.122.92:80
190.162.215.233:80
87.106.136.232:8080
68.115.186.26:80
62.30.7.67:443
37.179.204.33:80
110.145.77.103:80
78.24.219.147:8080
185.94.252.104:443
24.230.141.169:80
49.3.224.99:8080
104.131.123.136:443
74.208.45.104:8080
115.94.207.99:443
124.41.215.226:80
142.112.10.95:20
41.185.28.84:8080
139.99.158.11:443
113.61.66.94:80
67.163.161.107:80
172.86.188.251:8080
110.142.236.207:80
120.150.60.189:80
87.106.139.101:8080
61.76.222.210:80
93.147.212.206:80
50.245.107.73:443
85.105.111.166:80
94.230.70.6:80
134.209.144.106:443
202.141.243.254:443
94.23.237.171:443
209.141.54.221:7080
187.161.206.24:80
76.175.162.101:80
168.235.67.138:7080
24.137.76.62:80
95.9.5.93:80
123.142.37.166:80
72.186.136.247:443
182.208.30.18:443
186.74.215.34:80
162.241.140.129:8080
217.20.166.178:7080
184.180.181.202:80
217.123.207.149:80
202.134.4.211:8080
72.143.73.234:443
59.125.219.109:443
24.179.13.119:80
5.39.91.110:7080
109.74.5.95:8080
46.105.131.79:8080
91.211.88.52:7080
94.200.114.161:80
173.63.222.65:80
139.162.60.124:8080
188.219.31.12:80
139.59.60.244:8080
190.12.119.180:443
78.188.106.53:443
96.245.227.43:80
Signatures
-
resource yara_rule behavioral2/memory/1096-1-0x00000000022D0000-0x0000000002300000-memory.dmp emotet behavioral2/memory/1096-6-0x0000000002340000-0x0000000002371000-memory.dmp emotet behavioral2/memory/1096-2-0x0000000002300000-0x0000000002333000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExeFile (233).exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe 1096 ExeFile (233).exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 ExeFile (233).exe