Analysis
-
max time kernel
102s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
e2e6c9c4f405d4b7383f4915bb9acd90N.exe
Resource
win7-20240903-en
General
-
Target
e2e6c9c4f405d4b7383f4915bb9acd90N.exe
-
Size
896KB
-
MD5
e2e6c9c4f405d4b7383f4915bb9acd90
-
SHA1
020673eb1fe1701223f165c62bd8e298811aad7a
-
SHA256
a098a5cf586ea1836cd4912dc067fae2b1ecab7d4e0bef6f1e4598ff69e8ca7a
-
SHA512
24bd288cbf0e5c2b8b3e4d8798ff7709c678e0da8677d9ee8abc419774328bc7450420b1dc602570fbfc1ee88a825d6ac5e8eecad17c408d4fda080785c29544
-
SSDEEP
12288:zZlyqwEmkmauSVd2R3R0EcX0euXBzsBsU3z4ZuF:1m6whk90B/yQ
Malware Config
Extracted
emotet
Epoch1
174.100.27.229:80
209.126.6.222:8080
5.153.250.14:8080
192.241.146.84:8080
95.9.180.128:80
77.55.211.77:8080
85.105.140.135:443
45.33.77.42:8080
77.90.136.129:8080
94.176.234.118:443
190.163.31.26:80
190.6.193.152:8080
190.181.235.46:80
81.198.69.61:80
188.2.217.94:80
114.109.179.60:80
83.169.21.32:7080
137.74.106.111:7080
212.231.60.98:80
170.81.48.2:80
177.74.228.34:80
178.79.163.131:8080
190.147.137.153:443
73.116.193.136:80
187.162.248.237:80
80.249.176.206:80
12.162.84.2:8080
219.92.13.25:80
46.28.111.142:7080
185.94.252.12:80
24.135.198.218:80
217.199.160.224:7080
70.32.115.157:8080
91.219.169.180:80
186.103.141.250:443
70.32.84.74:8080
172.104.169.32:8080
181.129.96.162:8080
178.250.54.208:8080
61.92.159.208:8080
190.190.148.27:8080
192.241.143.52:8080
51.159.23.217:443
82.196.15.205:8080
45.161.242.102:80
186.70.127.199:8090
204.225.249.100:7080
58.171.153.81:80
145.236.8.174:80
87.106.46.107:8080
181.120.79.227:80
186.32.90.103:443
24.148.98.177:80
149.62.173.247:8080
217.13.106.14:8080
50.28.51.143:8080
143.0.87.101:80
209.236.123.42:8080
191.99.160.58:80
51.255.165.160:8080
111.67.12.221:8080
67.247.242.247:80
177.72.13.80:80
213.60.96.117:80
68.183.190.199:8080
202.62.39.111:80
104.131.103.37:8080
212.93.117.170:80
116.125.120.88:443
177.73.0.98:443
89.32.150.160:8080
147.91.184.91:80
189.2.177.210:443
72.47.248.48:7080
186.250.52.226:8080
2.47.112.152:80
185.94.252.27:443
95.85.151.205:80
212.71.237.140:8080
68.183.170.114:8080
213.176.36.147:8080
82.76.111.249:443
191.182.6.118:80
91.222.77.105:80
94.206.45.18:80
104.131.41.185:8080
190.115.18.139:8080
5.196.35.138:7080
201.171.150.41:443
177.144.135.2:80
207.144.103.227:80
Signatures
-
resource yara_rule behavioral1/memory/2088-0-0x00000000003B0000-0x00000000003BC000-memory.dmp emotet behavioral1/memory/2088-4-0x0000000000380000-0x0000000000389000-memory.dmp emotet behavioral1/memory/2708-7-0x00000000003A0000-0x00000000003AC000-memory.dmp emotet behavioral1/memory/2708-11-0x00000000003A0000-0x00000000003AC000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 2708 sdiageng.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\colbact\sdiageng.exe e2e6c9c4f405d4b7383f4915bb9acd90N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2e6c9c4f405d4b7383f4915bb9acd90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdiageng.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2708 sdiageng.exe 2708 sdiageng.exe 2708 sdiageng.exe 2708 sdiageng.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 e2e6c9c4f405d4b7383f4915bb9acd90N.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2088 e2e6c9c4f405d4b7383f4915bb9acd90N.exe 2088 e2e6c9c4f405d4b7383f4915bb9acd90N.exe 2708 sdiageng.exe 2708 sdiageng.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2708 2088 e2e6c9c4f405d4b7383f4915bb9acd90N.exe 30 PID 2088 wrote to memory of 2708 2088 e2e6c9c4f405d4b7383f4915bb9acd90N.exe 30 PID 2088 wrote to memory of 2708 2088 e2e6c9c4f405d4b7383f4915bb9acd90N.exe 30 PID 2088 wrote to memory of 2708 2088 e2e6c9c4f405d4b7383f4915bb9acd90N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2e6c9c4f405d4b7383f4915bb9acd90N.exe"C:\Users\Admin\AppData\Local\Temp\e2e6c9c4f405d4b7383f4915bb9acd90N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\colbact\sdiageng.exe"C:\Windows\SysWOW64\colbact\sdiageng.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD5e2e6c9c4f405d4b7383f4915bb9acd90
SHA1020673eb1fe1701223f165c62bd8e298811aad7a
SHA256a098a5cf586ea1836cd4912dc067fae2b1ecab7d4e0bef6f1e4598ff69e8ca7a
SHA51224bd288cbf0e5c2b8b3e4d8798ff7709c678e0da8677d9ee8abc419774328bc7450420b1dc602570fbfc1ee88a825d6ac5e8eecad17c408d4fda080785c29544