Analysis
-
max time kernel
110s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
420a9982fc68c54a3e2fe86500e4d590N.exe
Resource
win7-20240708-en
General
-
Target
420a9982fc68c54a3e2fe86500e4d590N.exe
-
Size
490KB
-
MD5
420a9982fc68c54a3e2fe86500e4d590
-
SHA1
6c39eb71d779629b530b34d867ccca424f69c010
-
SHA256
612dfdfabc11cb685aefc825a2d5e9e3fa52f0cb6f13eb058d271637e9fa22b1
-
SHA512
27267cc450b373f4535d191907ffdccd6a550496190c8f77f9a80e6e0974554060ae920c729071e8df010c83749b584be8d1ad37b6cbfd2f4fa7d5b1b5bc3cf8
-
SSDEEP
12288:ZvqNS1cxs67noJVIZqOx0JcJjCZIBVvQy:yvN7n3RxelZ/
Malware Config
Extracted
emotet
Epoch3
85.246.78.192:80
188.226.165.170:8080
188.40.170.197:80
51.38.50.144:8080
175.103.38.146:80
192.210.217.94:8080
180.23.53.200:80
202.29.237.113:8080
58.27.215.3:8080
190.85.46.52:7080
36.91.44.183:80
190.164.135.81:80
37.205.9.252:7080
192.241.220.183:8080
5.2.246.108:80
180.21.3.52:80
85.75.49.113:80
190.55.186.229:80
116.91.240.96:80
180.148.4.130:8080
109.13.179.195:80
162.144.145.58:8080
73.55.128.120:80
157.7.164.178:8081
221.147.142.214:80
47.154.85.229:80
8.4.9.137:8080
86.123.55.0:80
213.165.178.214:80
2.58.16.86:8080
172.105.78.244:8080
203.153.216.178:7080
192.163.221.191:8080
115.79.195.246:80
139.59.12.63:8080
54.38.143.245:8080
177.130.51.198:80
45.239.204.100:80
185.63.32.149:80
185.80.172.199:80
172.193.79.237:80
37.46.129.215:8080
103.229.73.17:8080
121.117.147.153:443
118.33.121.37:80
46.32.229.152:8080
119.92.77.17:80
181.59.59.54:80
179.5.118.12:80
73.100.19.104:80
50.116.78.109:8080
190.151.5.131:443
75.127.14.170:8080
41.185.29.128:8080
143.95.101.72:8080
77.74.78.80:443
74.208.173.91:8080
82.78.179.117:443
200.243.153.66:80
120.51.34.254:80
185.142.236.163:443
91.75.75.46:80
212.198.71.39:80
95.76.142.243:80
42.200.96.63:80
126.126.139.26:443
109.206.139.119:80
188.166.220.180:7080
190.192.39.136:80
110.37.224.243:80
172.96.190.154:8080
190.117.101.56:80
123.216.134.52:80
178.33.167.120:8080
37.187.100.220:7080
91.83.93.103:443
60.108.128.186:80
91.213.106.100:8080
125.200.20.233:80
79.133.6.236:8080
185.208.226.142:8080
198.20.228.9:8080
115.79.59.157:80
203.56.191.129:8080
113.203.238.130:80
103.93.220.182:80
5.79.70.250:8080
153.229.219.1:443
139.59.61.215:443
223.17.215.76:80
190.194.12.132:80
41.76.213.144:8080
103.80.51.61:8080
195.201.56.70:8080
46.105.131.68:8080
116.202.10.123:8080
113.161.148.81:80
Signatures
-
resource yara_rule behavioral2/memory/2104-1-0x0000000002290000-0x00000000022C0000-memory.dmp emotet behavioral2/memory/2104-0-0x00000000022C0000-0x00000000022F3000-memory.dmp emotet behavioral2/memory/2104-5-0x0000000002300000-0x0000000002331000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420a9982fc68c54a3e2fe86500e4d590N.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe 2104 420a9982fc68c54a3e2fe86500e4d590N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2104 420a9982fc68c54a3e2fe86500e4d590N.exe