Analysis

  • max time kernel
    112s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 07:02

General

  • Target

    2f80661e9cc870c5e9520ba97d9d6070N.exe

  • Size

    838KB

  • MD5

    2f80661e9cc870c5e9520ba97d9d6070

  • SHA1

    8c6d0b40143478a0e25c413ecc8bc8b1ef548807

  • SHA256

    cddc91cfcc8a9ffa98863c3dd07caac45c00142125e82eaf40e64e8cfac670bf

  • SHA512

    06b1a0f8e630e0a0fe4c04812cba6780ba449c1f50a6856e209b87d8c6eab560671627ef757fef48b0712bd99f16a667beb2f5901e9c02e5430e617d18482df1

  • SSDEEP

    12288:wZFfm9WYbWeR2XIl04x8nAPMDWpRvgOhIYWbu7xwT7fH6vueOfc3O:qM9WYL3ioIkgOhIYEf6vueOfc

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

85.246.78.192:80

188.226.165.170:8080

188.40.170.197:80

51.38.50.144:8080

175.103.38.146:80

192.210.217.94:8080

180.23.53.200:80

202.29.237.113:8080

58.27.215.3:8080

190.85.46.52:7080

36.91.44.183:80

190.164.135.81:80

37.205.9.252:7080

192.241.220.183:8080

5.2.246.108:80

180.21.3.52:80

85.75.49.113:80

190.55.186.229:80

116.91.240.96:80

180.148.4.130:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet payload 3 IoCs

    Detects Emotet payload in memory.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f80661e9cc870c5e9520ba97d9d6070N.exe
    "C:\Users\Admin\AppData\Local\Temp\2f80661e9cc870c5e9520ba97d9d6070N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2072-1-0x0000000002300000-0x0000000002318000-memory.dmp

    Filesize

    96KB

  • memory/2072-0-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/2072-5-0x0000000002330000-0x0000000002347000-memory.dmp

    Filesize

    92KB