Analysis
-
max time kernel
106s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
5414383c873052a717f07fb38bb9da70N.exe
Resource
win7-20240708-en
General
-
Target
5414383c873052a717f07fb38bb9da70N.exe
-
Size
838KB
-
MD5
5414383c873052a717f07fb38bb9da70
-
SHA1
de2d4ddcf83afc85e040b37a57a1fbb9ee0bf153
-
SHA256
25ace8b21a2623874335e5280f8e37f707807038ec6d21f2dd565720c0365b6b
-
SHA512
d3a4abc23a823985dae9f3ecb6586b9e0adc8ac0875ee419e1bfb0bb87b9f39b39c8132fd4ca6286d86fe433e0ede25f45d551384d17f41693dc78577d5c1753
-
SSDEEP
12288:LqFtrjWILWe14XIl0txcuXr5kTewflT8CY+hO76PPFPcN1qWxOfc3O:mDjWIPErbSplT8CYctPe1pxOfc
Malware Config
Extracted
emotet
Epoch2
24.178.90.49:80
96.126.101.6:8080
5.196.108.185:8080
167.114.153.111:8080
188.219.31.12:80
184.180.181.202:80
85.105.111.166:80
174.106.122.139:80
137.59.187.107:8080
185.94.252.104:443
142.112.10.95:20
102.182.93.220:80
75.188.96.231:80
93.147.212.206:80
120.150.218.241:443
87.106.139.101:8080
78.188.106.53:443
75.139.38.211:80
46.105.131.79:8080
168.235.67.138:7080
96.245.227.43:80
172.86.188.251:8080
108.46.29.236:80
118.83.154.64:443
162.241.140.129:8080
2.58.16.89:8080
109.74.5.95:8080
110.142.236.207:80
68.252.26.78:80
190.29.166.0:80
5.39.91.110:7080
97.82.79.83:80
139.99.158.11:443
95.9.5.93:80
190.240.194.77:443
123.176.25.234:80
74.208.45.104:8080
174.45.13.118:80
103.86.49.11:8080
62.75.141.82:80
130.0.132.242:80
218.147.193.146:80
115.94.207.99:443
83.110.223.58:443
110.145.77.103:80
217.20.166.178:7080
91.146.156.228:80
71.72.196.159:80
50.91.114.38:80
87.106.136.232:8080
104.131.123.136:443
89.121.205.18:80
124.41.215.226:80
66.76.12.94:8080
208.180.207.205:80
62.171.142.179:8080
61.19.246.238:443
75.143.247.51:80
47.36.140.164:80
120.150.60.189:80
74.214.230.200:80
209.54.13.14:80
24.137.76.62:80
190.108.228.27:443
61.33.119.226:443
123.142.37.166:80
176.111.60.55:8080
172.91.208.86:80
50.35.17.13:80
113.61.66.94:80
49.3.224.99:8080
79.137.83.50:443
69.206.132.149:80
24.230.141.169:80
121.7.31.214:80
95.213.236.64:8080
162.241.242.173:8080
47.144.21.12:443
202.141.243.254:443
80.241.255.202:8080
89.216.122.92:80
71.15.245.148:8080
76.171.227.238:80
24.179.13.119:80
139.162.60.124:8080
220.245.198.194:80
91.211.88.52:7080
41.185.28.84:8080
121.124.124.40:7080
203.153.216.189:7080
94.230.70.6:80
139.59.60.244:8080
62.30.7.67:443
194.187.133.160:443
78.24.219.147:8080
50.245.107.73:443
119.59.116.21:8080
186.74.215.34:80
173.63.222.65:80
157.245.99.39:8080
76.175.162.101:80
186.70.56.94:443
155.186.9.160:80
37.139.21.175:8080
153.164.70.236:80
94.200.114.161:80
104.131.11.150:443
216.139.123.119:80
72.143.73.234:443
49.50.209.131:80
209.141.54.221:7080
98.174.164.72:80
139.162.108.71:8080
37.187.72.193:8080
194.4.58.192:7080
94.23.237.171:443
172.104.97.173:8080
Signatures
-
resource yara_rule behavioral2/memory/1108-8-0x00000000022D0000-0x00000000022E6000-memory.dmp emotet behavioral2/memory/1108-4-0x0000000002320000-0x0000000002337000-memory.dmp emotet behavioral2/memory/1108-0-0x00000000022F0000-0x0000000002308000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5414383c873052a717f07fb38bb9da70N.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe 1108 5414383c873052a717f07fb38bb9da70N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1108 5414383c873052a717f07fb38bb9da70N.exe