Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
15bc0895b74de366ae8e1510bcb43030N.exe
Resource
win7-20240903-en
General
-
Target
15bc0895b74de366ae8e1510bcb43030N.exe
-
Size
400KB
-
MD5
15bc0895b74de366ae8e1510bcb43030
-
SHA1
8a3127d73ffe10f805dc8f58a517f1b940bf7769
-
SHA256
3727cb32b79ddf049caa252d943156883d823d9983ae81150c2e1f510b88db20
-
SHA512
8708d458ec47a81c643edb2df852bba272fd37fb2cabca532e6a9f3982676efb1581fe2c3c8852f2f64a86e14dc9c471c0d1074b4b0ceca7fea3e8dc0e24b9f6
-
SSDEEP
3072:eKQAYgKEzPP7BDV2WNbX+Ob5C7se89qjkD6Kd/Y+oQ6vDJ1Es7uKE2YAmU7viNxF:kAdTBDPN7+wPe8QjW64oQ6LJ1/iN
Malware Config
Extracted
emotet
Epoch2
104.193.103.61:80
104.131.123.136:443
5.196.108.189:8080
121.124.124.40:7080
87.106.139.101:8080
213.196.135.145:80
50.35.17.13:80
38.18.235.242:80
24.43.32.186:80
82.80.155.43:80
103.86.49.11:8080
113.61.66.94:80
24.137.76.62:80
187.49.206.134:80
42.200.107.142:80
24.179.13.119:80
93.147.212.206:80
108.46.29.236:80
105.186.233.33:80
37.139.21.175:8080
61.19.246.238:443
97.82.79.83:80
78.188.106.53:443
168.235.67.138:7080
83.169.36.251:8080
89.216.122.92:80
176.111.60.55:8080
181.169.34.190:80
118.83.154.64:443
140.186.212.146:80
139.59.60.244:8080
174.106.122.139:80
194.187.133.160:443
62.30.7.67:443
68.252.26.78:80
75.139.38.211:80
130.0.132.242:80
172.104.97.173:8080
85.152.162.105:80
74.208.45.104:8080
71.15.245.148:8080
139.162.60.124:8080
62.75.141.82:80
203.153.216.189:7080
91.211.88.52:7080
96.249.236.156:443
95.213.236.64:8080
66.65.136.14:80
104.131.44.150:8080
91.146.156.228:80
79.98.24.39:8080
174.45.13.118:80
157.245.99.39:8080
80.241.255.202:8080
71.72.196.159:80
120.150.60.189:80
220.245.198.194:80
121.7.31.214:80
85.96.199.93:80
67.10.155.92:80
109.74.5.95:8080
188.219.31.12:80
162.241.242.173:8080
110.145.77.103:80
78.24.219.147:8080
47.144.21.12:443
139.99.158.11:443
110.142.236.207:80
94.23.237.171:443
50.91.114.38:80
76.175.162.101:80
46.105.131.79:8080
181.169.235.7:80
87.106.136.232:8080
5.39.91.110:7080
24.43.99.75:80
104.131.11.150:443
139.162.108.71:8080
209.141.54.221:8080
124.41.215.226:80
123.176.25.234:80
137.59.187.107:8080
216.139.123.119:80
94.200.114.161:80
79.137.83.50:443
5.196.74.210:8080
104.236.246.93:8080
137.119.36.33:80
37.187.72.193:8080
172.91.208.86:80
142.112.10.95:20
134.209.36.254:8080
190.240.194.77:443
1.221.254.82:80
185.94.252.104:443
Signatures
-
resource yara_rule behavioral1/memory/2672-17-0x0000000000500000-0x0000000000510000-memory.dmp emotet behavioral1/memory/2660-41-0x0000000000380000-0x0000000000390000-memory.dmp emotet behavioral1/memory/2660-46-0x0000000000380000-0x0000000000390000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 2660 wmcodecdspps.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\uxlibres\wmcodecdspps.exe 15bc0895b74de366ae8e1510bcb43030N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15bc0895b74de366ae8e1510bcb43030N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmcodecdspps.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2660 wmcodecdspps.exe 2660 wmcodecdspps.exe 2660 wmcodecdspps.exe 2660 wmcodecdspps.exe 2660 wmcodecdspps.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2672 15bc0895b74de366ae8e1510bcb43030N.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2672 15bc0895b74de366ae8e1510bcb43030N.exe 2672 15bc0895b74de366ae8e1510bcb43030N.exe 2660 wmcodecdspps.exe 2660 wmcodecdspps.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2660 2672 15bc0895b74de366ae8e1510bcb43030N.exe 31 PID 2672 wrote to memory of 2660 2672 15bc0895b74de366ae8e1510bcb43030N.exe 31 PID 2672 wrote to memory of 2660 2672 15bc0895b74de366ae8e1510bcb43030N.exe 31 PID 2672 wrote to memory of 2660 2672 15bc0895b74de366ae8e1510bcb43030N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\15bc0895b74de366ae8e1510bcb43030N.exe"C:\Users\Admin\AppData\Local\Temp\15bc0895b74de366ae8e1510bcb43030N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\uxlibres\wmcodecdspps.exe"C:\Windows\SysWOW64\uxlibres\wmcodecdspps.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD515bc0895b74de366ae8e1510bcb43030
SHA18a3127d73ffe10f805dc8f58a517f1b940bf7769
SHA2563727cb32b79ddf049caa252d943156883d823d9983ae81150c2e1f510b88db20
SHA5128708d458ec47a81c643edb2df852bba272fd37fb2cabca532e6a9f3982676efb1581fe2c3c8852f2f64a86e14dc9c471c0d1074b4b0ceca7fea3e8dc0e24b9f6