Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
cc406d4cacdcc262554dffdd6ed5c9f0N.exe
Resource
win7-20240903-en
General
-
Target
cc406d4cacdcc262554dffdd6ed5c9f0N.exe
-
Size
548KB
-
MD5
cc406d4cacdcc262554dffdd6ed5c9f0
-
SHA1
5b03bc7f41e1698e2170213605b148f2afba25fa
-
SHA256
4de99bda5c68fe50b7b77c56e046cbf7de72d77d667147e34ba13642679ac716
-
SHA512
3c6b685915a7c31bfbed3c6b3c11ff0603d4b84f6c695c46c15466698f3888ba376e6882a2abb2aab84c4c5d10624f3d23bbc4c745d886dd97c202a034bc021e
-
SSDEEP
12288:mhUoKduoMcRA9dJtcw55NGGtxibIuyAwykMdcS5Ok5:MUBuoMcRAvHhGsxildwykMdcS5
Malware Config
Extracted
emotet
Epoch3
112.78.142.170:80
178.128.14.92:8080
178.238.232.46:443
185.142.236.163:443
192.210.217.94:8080
192.241.220.183:8080
105.209.235.113:8080
182.187.139.200:8080
188.0.135.237:80
201.213.177.139:80
31.146.61.34:80
202.5.47.71:80
81.17.93.134:80
192.163.221.191:8080
97.104.107.190:80
201.235.10.215:80
181.114.114.203:80
51.38.201.19:7080
46.32.229.152:8080
177.144.130.105:443
188.251.213.180:443
91.83.93.103:443
118.70.15.19:8080
197.83.232.19:80
195.201.56.70:8080
172.105.78.244:8080
177.37.81.212:443
172.96.190.154:8080
177.32.8.85:80
107.161.30.122:8080
175.29.183.2:80
86.57.216.23:80
185.86.148.68:443
198.57.203.63:8080
115.79.195.246:80
177.94.227.143:80
50.116.78.109:8080
181.134.9.162:80
92.24.51.238:80
197.249.6.179:443
87.106.231.60:8080
41.185.29.128:8080
78.189.60.109:443
81.214.253.80:443
77.74.78.80:443
105.213.67.88:80
143.95.101.72:8080
60.125.114.64:443
115.78.11.155:80
71.57.180.213:80
139.59.12.63:8080
203.153.216.178:7080
190.190.15.20:80
37.46.129.215:8080
190.53.144.120:80
203.153.216.182:7080
139.99.157.213:8080
86.98.143.163:80
178.33.167.120:8080
113.161.148.81:80
66.61.94.36:80
74.208.173.91:8080
157.7.164.178:8081
190.212.140.6:80
217.199.160.224:8080
46.105.131.68:8080
185.208.226.142:8080
179.62.238.49:80
179.5.118.12:80
216.75.37.196:8080
181.113.229.139:443
190.164.75.175:80
212.112.113.235:80
5.79.70.250:8080
75.127.14.170:8080
Signatures
-
resource yara_rule behavioral2/memory/816-1-0x0000000002300000-0x000000000230C000-memory.dmp emotet behavioral2/memory/816-0-0x00000000006F0000-0x00000000006F9000-memory.dmp emotet behavioral2/memory/816-5-0x0000000002300000-0x000000000230C000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc406d4cacdcc262554dffdd6ed5c9f0N.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe 816 cc406d4cacdcc262554dffdd6ed5c9f0N.exe