Analysis
-
max time kernel
116s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
381aeba25c0f1f83d76c1638774d2400N.exe
Resource
win7-20240903-en
General
-
Target
381aeba25c0f1f83d76c1638774d2400N.exe
-
Size
368KB
-
MD5
381aeba25c0f1f83d76c1638774d2400
-
SHA1
86963428934f9c8019d690e3303b590f0a42d20d
-
SHA256
d388df08c8c36e3c57318e0a71b88e7f6a7fdf1b8a821ded08bbdd0d3ddc66b0
-
SHA512
c1058fffe61bada5561592d4371831fdbf8d60f08e5369e05517ce742fa9cc844dfdc3b31eb5e653baafcb58e1634fc7b2eb8fb0792ee4be69d432126cee5827
-
SSDEEP
6144:HzoTjUrx4KVHa9eUfTLHy2VrH0D+wieI3l7lT2IcO/wksAPJLzx:ToCHVcjZwiew7l6i/wi
Malware Config
Extracted
emotet
Epoch2
200.116.145.225:443
96.126.101.6:8080
5.196.108.185:8080
167.114.153.111:8080
194.187.133.160:443
98.174.164.72:80
103.86.49.11:8080
78.24.219.147:8080
50.245.107.73:443
110.145.77.103:80
94.200.114.161:80
61.19.246.238:443
194.4.58.192:7080
209.54.13.14:80
102.182.93.220:80
46.105.131.79:8080
142.112.10.95:20
186.70.56.94:443
203.153.216.189:7080
49.50.209.131:80
176.113.52.6:443
62.30.7.67:443
61.76.222.210:80
113.61.66.94:80
157.245.99.39:8080
216.139.123.119:80
184.180.181.202:80
123.142.37.166:80
124.41.215.226:80
119.59.116.21:8080
41.185.28.84:8080
5.39.91.110:7080
220.245.198.194:80
139.162.108.71:8080
75.143.247.51:80
74.214.230.200:80
185.94.252.104:443
208.180.207.205:80
49.3.224.99:8080
93.147.212.206:80
182.208.30.18:443
95.213.236.64:8080
37.187.72.193:8080
59.125.219.109:443
37.179.204.33:80
95.9.5.93:80
168.235.67.138:7080
118.83.154.64:443
121.7.31.214:80
74.208.45.104:8080
87.106.136.232:8080
138.68.87.218:443
62.75.141.82:80
66.76.12.94:8080
202.134.4.216:8080
47.36.140.164:80
110.142.236.207:80
134.209.144.106:443
89.216.122.92:80
75.188.96.231:80
24.179.13.119:80
218.147.193.146:80
174.106.122.139:80
71.15.245.148:8080
104.131.11.150:443
202.141.243.254:443
94.230.70.6:80
24.178.90.49:80
97.82.79.83:80
68.252.26.78:80
173.63.222.65:80
162.241.242.173:8080
79.137.83.50:443
80.241.255.202:8080
120.150.60.189:80
190.29.166.0:80
96.245.227.43:80
50.91.114.38:80
83.110.223.58:443
24.230.141.169:80
37.139.21.175:8080
202.134.4.211:8080
190.240.194.77:443
176.111.60.55:8080
123.176.25.234:80
209.141.54.221:7080
115.94.207.99:443
50.35.17.13:80
109.74.5.95:8080
120.150.218.241:443
121.124.124.40:7080
217.20.166.178:7080
108.46.29.236:80
2.58.16.89:8080
85.105.111.166:80
137.59.187.107:8080
139.162.60.124:8080
76.175.162.101:80
139.99.158.11:443
104.131.123.136:443
91.211.88.52:7080
91.146.156.228:80
172.104.97.173:8080
89.121.205.18:80
186.74.215.34:80
61.33.119.226:443
162.241.140.129:8080
130.0.132.242:80
190.108.228.27:443
201.241.127.190:80
87.106.139.101:8080
78.188.106.53:443
188.219.31.12:80
76.171.227.238:80
72.143.73.234:443
62.171.142.179:8080
139.59.60.244:8080
24.137.76.62:80
172.86.188.251:8080
172.91.208.86:80
94.23.237.171:443
Signatures
-
resource yara_rule behavioral1/memory/2328-0-0x0000000000270000-0x0000000000292000-memory.dmp emotet behavioral1/memory/2328-8-0x0000000000220000-0x0000000000240000-memory.dmp emotet behavioral1/memory/2328-4-0x00000000002A0000-0x00000000002C1000-memory.dmp emotet behavioral1/memory/2052-11-0x0000000001D70000-0x0000000001D92000-memory.dmp emotet behavioral1/memory/2052-15-0x0000000001DA0000-0x0000000001DC1000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 2052 find.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WcnApi\find.exe 381aeba25c0f1f83d76c1638774d2400N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 381aeba25c0f1f83d76c1638774d2400N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2052 find.exe 2052 find.exe 2052 find.exe 2052 find.exe 2052 find.exe 2052 find.exe 2052 find.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2328 381aeba25c0f1f83d76c1638774d2400N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2328 381aeba25c0f1f83d76c1638774d2400N.exe 2052 find.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2052 2328 381aeba25c0f1f83d76c1638774d2400N.exe 29 PID 2328 wrote to memory of 2052 2328 381aeba25c0f1f83d76c1638774d2400N.exe 29 PID 2328 wrote to memory of 2052 2328 381aeba25c0f1f83d76c1638774d2400N.exe 29 PID 2328 wrote to memory of 2052 2328 381aeba25c0f1f83d76c1638774d2400N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\381aeba25c0f1f83d76c1638774d2400N.exe"C:\Users\Admin\AppData\Local\Temp\381aeba25c0f1f83d76c1638774d2400N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\WcnApi\find.exe"C:\Windows\SysWOW64\WcnApi\find.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD5381aeba25c0f1f83d76c1638774d2400
SHA186963428934f9c8019d690e3303b590f0a42d20d
SHA256d388df08c8c36e3c57318e0a71b88e7f6a7fdf1b8a821ded08bbdd0d3ddc66b0
SHA512c1058fffe61bada5561592d4371831fdbf8d60f08e5369e05517ce742fa9cc844dfdc3b31eb5e653baafcb58e1634fc7b2eb8fb0792ee4be69d432126cee5827