Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
f9fba4aaba360e8c54be620c4e7418e0N.exe
Resource
win7-20240903-en
General
-
Target
f9fba4aaba360e8c54be620c4e7418e0N.exe
-
Size
668KB
-
MD5
f9fba4aaba360e8c54be620c4e7418e0
-
SHA1
e55caf6504792e0442b405fcec6699b1cc5e64ad
-
SHA256
2a3b897cf137c82297222d708ca1aa02f9254253122a8caf3a2f64259dedb643
-
SHA512
86d3618988898d2bf2d30a571fdb678a7a939e7cabce38e7d0ccc5e1846e00f9edd2f4fc5eda875aefdf4a08b853fff106d91ca89969d80d007c285e6aa441d7
-
SSDEEP
6144:gdiE4zqXVY7PfBHnzA0F3JhJx4eS58NMTy5fkLaMiLgLWL7SqaaYo5wzPLNQOIeG:gdw7hHnzAe3oe68Z6zEPaexL62
Malware Config
Extracted
emotet
Epoch1
202.22.141.45:80
37.187.161.206:8080
202.29.239.162:443
80.87.201.221:7080
82.76.111.249:443
216.47.196.104:80
192.241.143.52:8080
192.81.38.31:80
87.106.253.248:8080
64.201.88.132:80
192.241.146.84:8080
12.162.84.2:8080
1.226.84.243:8080
177.129.17.170:443
202.134.4.210:7080
70.169.17.134:80
152.169.22.67:80
5.196.35.138:7080
138.97.60.141:7080
203.205.28.68:80
83.169.21.32:7080
191.182.6.118:80
190.188.245.242:80
62.84.75.50:80
181.74.0.251:80
189.2.177.210:443
111.67.12.221:8080
188.135.15.49:80
217.13.106.14:8080
68.183.190.199:8080
178.250.54.208:8080
189.35.44.221:80
201.213.177.139:80
137.74.106.111:7080
177.73.0.98:443
70.32.84.74:8080
51.15.7.145:80
177.74.228.34:80
185.94.252.27:443
50.121.220.50:80
186.70.127.199:8090
85.214.26.7:8080
181.129.96.162:8080
70.32.115.157:8080
82.230.1.24:80
60.93.23.51:80
213.197.182.158:8080
149.202.72.142:7080
190.115.18.139:8080
72.167.223.217:8080
190.24.243.186:80
109.169.12.78:80
94.176.234.118:443
185.232.182.218:80
219.92.13.25:80
209.236.123.42:8080
119.106.216.84:80
51.255.165.160:8080
51.75.33.127:80
51.15.7.189:80
61.197.92.216:80
5.189.178.202:8080
172.104.169.32:8080
45.33.77.42:8080
98.13.75.196:80
74.58.215.226:80
68.183.170.114:8080
155.186.0.121:80
190.117.79.209:80
128.92.203.42:80
202.4.58.197:80
70.116.143.84:80
77.238.212.227:80
67.247.242.247:80
12.163.208.58:80
212.71.237.140:8080
46.43.2.95:8080
96.227.52.8:443
186.103.141.250:443
185.94.252.12:80
104.131.41.185:8080
45.46.37.97:80
95.9.180.128:80
87.106.46.107:8080
50.28.51.143:8080
65.36.62.20:80
35.143.99.174:80
51.38.124.206:80
185.183.16.47:80
181.30.61.163:443
170.81.48.2:80
74.136.144.133:80
Signatures
-
resource yara_rule behavioral1/memory/268-4-0x00000000002B0000-0x00000000002C0000-memory.dmp emotet behavioral1/memory/268-0-0x0000000000290000-0x00000000002A2000-memory.dmp emotet behavioral1/memory/268-7-0x0000000000250000-0x000000000025F000-memory.dmp emotet behavioral1/memory/2488-10-0x00000000002F0000-0x0000000000302000-memory.dmp emotet behavioral1/memory/2488-14-0x0000000000320000-0x0000000000330000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 2488 KBDKAZ.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\TsWpfWrp\KBDKAZ.exe f9fba4aaba360e8c54be620c4e7418e0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9fba4aaba360e8c54be620c4e7418e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KBDKAZ.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2488 KBDKAZ.exe 2488 KBDKAZ.exe 2488 KBDKAZ.exe 2488 KBDKAZ.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 268 f9fba4aaba360e8c54be620c4e7418e0N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 268 f9fba4aaba360e8c54be620c4e7418e0N.exe 2488 KBDKAZ.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 268 wrote to memory of 2488 268 f9fba4aaba360e8c54be620c4e7418e0N.exe 31 PID 268 wrote to memory of 2488 268 f9fba4aaba360e8c54be620c4e7418e0N.exe 31 PID 268 wrote to memory of 2488 268 f9fba4aaba360e8c54be620c4e7418e0N.exe 31 PID 268 wrote to memory of 2488 268 f9fba4aaba360e8c54be620c4e7418e0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9fba4aaba360e8c54be620c4e7418e0N.exe"C:\Users\Admin\AppData\Local\Temp\f9fba4aaba360e8c54be620c4e7418e0N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\TsWpfWrp\KBDKAZ.exe"C:\Windows\SysWOW64\TsWpfWrp\KBDKAZ.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
668KB
MD5f9fba4aaba360e8c54be620c4e7418e0
SHA1e55caf6504792e0442b405fcec6699b1cc5e64ad
SHA2562a3b897cf137c82297222d708ca1aa02f9254253122a8caf3a2f64259dedb643
SHA51286d3618988898d2bf2d30a571fdb678a7a939e7cabce38e7d0ccc5e1846e00f9edd2f4fc5eda875aefdf4a08b853fff106d91ca89969d80d007c285e6aa441d7