Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
e7e67c672650c9eb466022996c28e100N.exe
Resource
win7-20240903-en
General
-
Target
e7e67c672650c9eb466022996c28e100N.exe
-
Size
548KB
-
MD5
e7e67c672650c9eb466022996c28e100
-
SHA1
fa34d5caf417fbd719e377ee45a55c0e11a4a53c
-
SHA256
4f69f1b398ff51af7f92a9e2aa00c070bb42ed82a6f09357d167e95f7f6069f8
-
SHA512
cd842d02b277762f491a0320d207e08e44b3f5cff4a3159e59fa424f47bcd114e3be5a5d35e213030300e078b0b861d01c22760a2d6ce734fdb00832c6b4ebbb
-
SSDEEP
12288:mhUoKduoMcRA9dJtcw55NGGtxibIuyAwykMdcS5Ok5:MUBuoMcRAvHhGsxildwykMdcS5
Malware Config
Extracted
emotet
Epoch3
112.78.142.170:80
178.128.14.92:8080
178.238.232.46:443
185.142.236.163:443
192.210.217.94:8080
192.241.220.183:8080
105.209.235.113:8080
182.187.139.200:8080
188.0.135.237:80
201.213.177.139:80
31.146.61.34:80
202.5.47.71:80
81.17.93.134:80
192.163.221.191:8080
97.104.107.190:80
201.235.10.215:80
181.114.114.203:80
51.38.201.19:7080
46.32.229.152:8080
177.144.130.105:443
188.251.213.180:443
91.83.93.103:443
118.70.15.19:8080
197.83.232.19:80
195.201.56.70:8080
172.105.78.244:8080
177.37.81.212:443
172.96.190.154:8080
177.32.8.85:80
107.161.30.122:8080
175.29.183.2:80
86.57.216.23:80
185.86.148.68:443
198.57.203.63:8080
115.79.195.246:80
177.94.227.143:80
50.116.78.109:8080
181.134.9.162:80
92.24.51.238:80
197.249.6.179:443
87.106.231.60:8080
41.185.29.128:8080
78.189.60.109:443
81.214.253.80:443
77.74.78.80:443
105.213.67.88:80
143.95.101.72:8080
60.125.114.64:443
115.78.11.155:80
71.57.180.213:80
139.59.12.63:8080
203.153.216.178:7080
190.190.15.20:80
37.46.129.215:8080
190.53.144.120:80
203.153.216.182:7080
139.99.157.213:8080
86.98.143.163:80
178.33.167.120:8080
113.161.148.81:80
66.61.94.36:80
74.208.173.91:8080
157.7.164.178:8081
190.212.140.6:80
217.199.160.224:8080
46.105.131.68:8080
185.208.226.142:8080
179.62.238.49:80
179.5.118.12:80
216.75.37.196:8080
181.113.229.139:443
190.164.75.175:80
212.112.113.235:80
5.79.70.250:8080
75.127.14.170:8080
Signatures
-
resource yara_rule behavioral1/memory/2948-0-0x00000000002B0000-0x00000000002BC000-memory.dmp emotet behavioral1/memory/2948-4-0x00000000002A0000-0x00000000002A9000-memory.dmp emotet behavioral1/memory/2768-7-0x00000000002A0000-0x00000000002AC000-memory.dmp emotet behavioral1/memory/2768-11-0x00000000002A0000-0x00000000002AC000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 2768 api-ms-win-core-string-l1-1-0.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ReAgentc\api-ms-win-core-string-l1-1-0.exe e7e67c672650c9eb466022996c28e100N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7e67c672650c9eb466022996c28e100N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language api-ms-win-core-string-l1-1-0.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2768 api-ms-win-core-string-l1-1-0.exe 2768 api-ms-win-core-string-l1-1-0.exe 2768 api-ms-win-core-string-l1-1-0.exe 2768 api-ms-win-core-string-l1-1-0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2948 e7e67c672650c9eb466022996c28e100N.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2948 e7e67c672650c9eb466022996c28e100N.exe 2948 e7e67c672650c9eb466022996c28e100N.exe 2768 api-ms-win-core-string-l1-1-0.exe 2768 api-ms-win-core-string-l1-1-0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2768 2948 e7e67c672650c9eb466022996c28e100N.exe 30 PID 2948 wrote to memory of 2768 2948 e7e67c672650c9eb466022996c28e100N.exe 30 PID 2948 wrote to memory of 2768 2948 e7e67c672650c9eb466022996c28e100N.exe 30 PID 2948 wrote to memory of 2768 2948 e7e67c672650c9eb466022996c28e100N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7e67c672650c9eb466022996c28e100N.exe"C:\Users\Admin\AppData\Local\Temp\e7e67c672650c9eb466022996c28e100N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\ReAgentc\api-ms-win-core-string-l1-1-0.exe"C:\Windows\SysWOW64\ReAgentc\api-ms-win-core-string-l1-1-0.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD5e7e67c672650c9eb466022996c28e100
SHA1fa34d5caf417fbd719e377ee45a55c0e11a4a53c
SHA2564f69f1b398ff51af7f92a9e2aa00c070bb42ed82a6f09357d167e95f7f6069f8
SHA512cd842d02b277762f491a0320d207e08e44b3f5cff4a3159e59fa424f47bcd114e3be5a5d35e213030300e078b0b861d01c22760a2d6ce734fdb00832c6b4ebbb