Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
ExeFile (360).exe
Resource
win7-20240704-en
General
-
Target
ExeFile (360).exe
-
Size
524KB
-
MD5
8e2bdd409a89cbb6b5eb424e9d1bda34
-
SHA1
f8e82cca5dbb430bafd16b516f6e97cdb754ba72
-
SHA256
297556d0ee81785209ae8464a2e8665271dfb03b2d321531d7d82804549b54e6
-
SHA512
489cfda09d79e33bc0ce1e8b96f4d2f04d6c21b5babc78d6594df3e8a913558a6dce6b027d42cbf4bf23f7e044a413158c63dd1b4f10da25630d0e36947c4baf
-
SSDEEP
12288:pdZN7lYBPWkuaYWdm7/PC4ox9XUQz8h4RmAwV:pEKZWdm7/4UKmA
Malware Config
Extracted
emotet
Epoch2
74.219.172.26:80
134.209.36.254:8080
104.156.59.7:8080
120.138.30.150:8080
194.187.133.160:443
104.236.246.93:8080
74.208.45.104:8080
78.187.156.31:80
187.161.206.24:80
94.23.216.33:80
172.91.208.86:80
91.211.88.52:7080
50.91.114.38:80
200.123.150.89:443
121.124.124.40:7080
62.75.141.82:80
5.196.74.210:8080
24.137.76.62:80
85.105.205.77:8080
139.130.242.43:80
82.225.49.121:80
110.145.77.103:80
195.251.213.56:80
46.105.131.79:8080
87.106.136.232:8080
75.139.38.211:80
124.41.215.226:80
203.153.216.189:7080
162.241.242.173:8080
219.74.18.66:443
174.45.13.118:80
68.188.112.97:80
200.114.213.233:8080
213.196.135.145:80
61.92.17.12:80
61.19.246.238:443
219.75.128.166:80
120.150.60.189:80
123.176.25.234:80
1.221.254.82:80
137.119.36.33:80
94.23.237.171:443
74.120.55.163:80
62.30.7.67:443
104.131.11.150:443
139.59.67.118:443
209.141.54.221:8080
79.137.83.50:443
84.39.182.7:80
97.82.79.83:80
87.106.139.101:8080
94.1.108.190:443
37.187.72.193:8080
139.162.108.71:8080
93.147.212.206:80
74.134.41.124:80
103.86.49.11:8080
75.80.124.4:80
109.74.5.95:8080
153.232.188.106:80
168.235.67.138:7080
50.35.17.13:80
42.200.107.142:80
82.80.155.43:80
78.24.219.147:8080
24.43.99.75:80
107.5.122.110:80
156.155.166.221:80
83.169.36.251:8080
47.144.21.12:443
79.98.24.39:8080
181.169.34.190:80
139.59.60.244:8080
85.152.162.105:80
185.94.252.104:443
110.5.16.198:80
174.102.48.180:443
140.186.212.146:80
95.179.229.244:8080
104.32.141.43:80
169.239.182.217:8080
121.7.127.163:80
94.200.114.161:80
201.173.217.124:443
104.131.44.150:8080
137.59.187.107:8080
5.39.91.110:7080
203.117.253.142:80
157.245.99.39:8080
176.111.60.55:8080
95.213.236.64:8080
220.245.198.194:80
37.139.21.175:8080
89.216.122.92:80
139.99.158.11:443
24.179.13.119:80
188.219.31.12:80
Signatures
-
resource yara_rule behavioral2/memory/2316-4-0x0000000000A90000-0x0000000000AA0000-memory.dmp emotet behavioral2/memory/2316-7-0x0000000000A50000-0x0000000000A5F000-memory.dmp emotet behavioral2/memory/2316-0-0x0000000000A60000-0x0000000000A72000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExeFile (360).exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe 2316 ExeFile (360).exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 ExeFile (360).exe 2316 ExeFile (360).exe