Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 07:05
Static task
static1
Behavioral task
behavioral1
Sample
f1e7e950fd48e4967070f9362ba36360N.exe
Resource
win7-20240708-en
General
-
Target
f1e7e950fd48e4967070f9362ba36360N.exe
-
Size
400KB
-
MD5
f1e7e950fd48e4967070f9362ba36360
-
SHA1
017eca3c2427513c011f44bdb05f220fc2abeb11
-
SHA256
e53a5c68f22ffd1e5ec9ea67a413ef05fc1a8333ed8ef1a8257e243853a11dc8
-
SHA512
c01189be7fd5546a60e934763542e67b366391ad66b0c907b101aadca7ca96f9c411aa2550e13fc65e06f2c28477275bd3e73ec15c014f800c21c0292fb1913d
-
SSDEEP
3072:eKQAYgKEdPP7BDV2WNbX+Ob5C7se89qjkD6Kd/Y+oQ6vDJ1Es7uKE2YAmU7viNxF:kA/TBDPN7+wPe8QjW64oQ6LJ1/iN
Malware Config
Extracted
emotet
Epoch2
104.193.103.61:80
104.131.123.136:443
5.196.108.189:8080
121.124.124.40:7080
87.106.139.101:8080
213.196.135.145:80
50.35.17.13:80
38.18.235.242:80
24.43.32.186:80
82.80.155.43:80
103.86.49.11:8080
113.61.66.94:80
24.137.76.62:80
187.49.206.134:80
42.200.107.142:80
24.179.13.119:80
93.147.212.206:80
108.46.29.236:80
105.186.233.33:80
37.139.21.175:8080
61.19.246.238:443
97.82.79.83:80
78.188.106.53:443
168.235.67.138:7080
83.169.36.251:8080
89.216.122.92:80
176.111.60.55:8080
181.169.34.190:80
118.83.154.64:443
140.186.212.146:80
139.59.60.244:8080
174.106.122.139:80
194.187.133.160:443
62.30.7.67:443
68.252.26.78:80
75.139.38.211:80
130.0.132.242:80
172.104.97.173:8080
85.152.162.105:80
74.208.45.104:8080
71.15.245.148:8080
139.162.60.124:8080
62.75.141.82:80
203.153.216.189:7080
91.211.88.52:7080
96.249.236.156:443
95.213.236.64:8080
66.65.136.14:80
104.131.44.150:8080
91.146.156.228:80
79.98.24.39:8080
174.45.13.118:80
157.245.99.39:8080
80.241.255.202:8080
71.72.196.159:80
120.150.60.189:80
220.245.198.194:80
121.7.31.214:80
85.96.199.93:80
67.10.155.92:80
109.74.5.95:8080
188.219.31.12:80
162.241.242.173:8080
110.145.77.103:80
78.24.219.147:8080
47.144.21.12:443
139.99.158.11:443
110.142.236.207:80
94.23.237.171:443
50.91.114.38:80
76.175.162.101:80
46.105.131.79:8080
181.169.235.7:80
87.106.136.232:8080
5.39.91.110:7080
24.43.99.75:80
104.131.11.150:443
139.162.108.71:8080
209.141.54.221:8080
124.41.215.226:80
123.176.25.234:80
137.59.187.107:8080
216.139.123.119:80
94.200.114.161:80
79.137.83.50:443
5.196.74.210:8080
104.236.246.93:8080
137.119.36.33:80
37.187.72.193:8080
172.91.208.86:80
142.112.10.95:20
134.209.36.254:8080
190.240.194.77:443
1.221.254.82:80
185.94.252.104:443
Signatures
-
resource yara_rule behavioral2/memory/4752-17-0x0000000002A40000-0x0000000002A50000-memory.dmp emotet behavioral2/memory/4752-22-0x0000000002A40000-0x0000000002A50000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1e7e950fd48e4967070f9362ba36360N.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4752 f1e7e950fd48e4967070f9362ba36360N.exe 4752 f1e7e950fd48e4967070f9362ba36360N.exe