Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
2f80661e9cc870c5e9520ba97d9d6070N.exe
Resource
win7-20240903-en
General
-
Target
2f80661e9cc870c5e9520ba97d9d6070N.exe
-
Size
838KB
-
MD5
2f80661e9cc870c5e9520ba97d9d6070
-
SHA1
8c6d0b40143478a0e25c413ecc8bc8b1ef548807
-
SHA256
cddc91cfcc8a9ffa98863c3dd07caac45c00142125e82eaf40e64e8cfac670bf
-
SHA512
06b1a0f8e630e0a0fe4c04812cba6780ba449c1f50a6856e209b87d8c6eab560671627ef757fef48b0712bd99f16a667beb2f5901e9c02e5430e617d18482df1
-
SSDEEP
12288:wZFfm9WYbWeR2XIl04x8nAPMDWpRvgOhIYWbu7xwT7fH6vueOfc3O:qM9WYL3ioIkgOhIYEf6vueOfc
Malware Config
Extracted
emotet
Epoch3
85.246.78.192:80
188.226.165.170:8080
188.40.170.197:80
51.38.50.144:8080
175.103.38.146:80
192.210.217.94:8080
180.23.53.200:80
202.29.237.113:8080
58.27.215.3:8080
190.85.46.52:7080
36.91.44.183:80
190.164.135.81:80
37.205.9.252:7080
192.241.220.183:8080
5.2.246.108:80
180.21.3.52:80
85.75.49.113:80
190.55.186.229:80
116.91.240.96:80
180.148.4.130:8080
109.13.179.195:80
162.144.145.58:8080
73.55.128.120:80
157.7.164.178:8081
221.147.142.214:80
47.154.85.229:80
8.4.9.137:8080
86.123.55.0:80
213.165.178.214:80
2.58.16.86:8080
172.105.78.244:8080
203.153.216.178:7080
192.163.221.191:8080
115.79.195.246:80
139.59.12.63:8080
54.38.143.245:8080
177.130.51.198:80
45.239.204.100:80
185.63.32.149:80
185.80.172.199:80
172.193.79.237:80
37.46.129.215:8080
103.229.73.17:8080
121.117.147.153:443
118.33.121.37:80
46.32.229.152:8080
119.92.77.17:80
181.59.59.54:80
179.5.118.12:80
73.100.19.104:80
50.116.78.109:8080
190.151.5.131:443
75.127.14.170:8080
41.185.29.128:8080
143.95.101.72:8080
77.74.78.80:443
74.208.173.91:8080
82.78.179.117:443
200.243.153.66:80
120.51.34.254:80
185.142.236.163:443
91.75.75.46:80
212.198.71.39:80
95.76.142.243:80
42.200.96.63:80
126.126.139.26:443
109.206.139.119:80
188.166.220.180:7080
190.192.39.136:80
110.37.224.243:80
172.96.190.154:8080
190.117.101.56:80
123.216.134.52:80
178.33.167.120:8080
37.187.100.220:7080
91.83.93.103:443
60.108.128.186:80
91.213.106.100:8080
125.200.20.233:80
79.133.6.236:8080
185.208.226.142:8080
198.20.228.9:8080
115.79.59.157:80
203.56.191.129:8080
113.203.238.130:80
103.93.220.182:80
5.79.70.250:8080
153.229.219.1:443
139.59.61.215:443
223.17.215.76:80
190.194.12.132:80
41.76.213.144:8080
103.80.51.61:8080
195.201.56.70:8080
46.105.131.68:8080
116.202.10.123:8080
113.161.148.81:80
Signatures
-
resource yara_rule behavioral2/memory/2072-1-0x0000000002300000-0x0000000002318000-memory.dmp emotet behavioral2/memory/2072-0-0x00000000022E0000-0x00000000022F6000-memory.dmp emotet behavioral2/memory/2072-5-0x0000000002330000-0x0000000002347000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f80661e9cc870c5e9520ba97d9d6070N.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2072 2f80661e9cc870c5e9520ba97d9d6070N.exe