Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe
Resource
win7-20240903-en
General
-
Target
f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe
-
Size
1.1MB
-
MD5
f6a8c8f8f7695dcf2d1e2010c10fe5b0
-
SHA1
f8258d1962d06814bc1af084118cea745813ff1e
-
SHA256
e3a212f22c1e1bd5caccc3428fdab7e66d2dca43b4e2235dba26b9b0f166cdc2
-
SHA512
7749d539e2dd19af4cb35eac97eafd4a9f88024c5a88839f8269e711f8b3dac81f2c2e7fe246054810e1ac05016926881bf5031046453217e6b8abbbbd5fd366
-
SSDEEP
24576:sTr5SZIyWWWWWWWvmgWzOvzZtfZrxRdbDME:sTr52IKgWzOvPfZtbP
Malware Config
Extracted
emotet
Epoch3
118.110.236.121:8080
149.202.5.139:443
153.92.4.96:8080
51.75.163.68:7080
105.209.235.113:8080
77.74.78.80:443
51.38.201.19:7080
71.57.180.213:80
139.59.12.63:8080
185.86.148.68:443
179.62.238.49:80
58.27.215.3:8080
81.214.253.80:443
46.32.229.152:8080
197.221.158.162:80
81.17.93.134:80
118.101.24.148:80
86.98.143.163:80
46.105.131.68:8080
24.26.151.3:80
41.185.29.128:8080
54.38.143.245:8080
220.254.198.228:443
210.1.219.238:80
185.208.226.142:8080
91.75.75.46:80
157.7.164.178:8081
181.137.229.1:80
190.212.140.6:80
190.225.150.234:80
103.80.51.61:8080
190.53.144.120:80
177.144.130.105:443
101.50.232.218:80
162.144.42.60:8080
172.105.78.244:8080
185.142.236.163:443
45.182.161.17:80
8.4.9.137:8080
179.5.118.12:80
190.55.186.229:80
5.79.70.250:8080
88.249.181.198:443
73.84.105.76:80
198.57.203.63:8080
143.95.101.72:8080
190.190.15.20:80
2.144.244.204:443
190.164.75.175:80
189.39.32.161:80
115.78.11.155:80
186.227.146.102:80
192.210.217.94:8080
157.245.138.101:7080
60.125.114.64:443
179.191.239.255:80
37.205.9.252:7080
181.122.154.240:80
50.116.78.109:8080
91.83.93.103:443
82.239.200.118:80
113.161.148.81:80
192.163.221.191:8080
173.94.215.84:80
181.113.229.139:443
201.235.10.215:80
162.249.220.190:80
175.29.183.2:80
190.136.179.102:80
75.127.14.170:8080
115.79.195.246:80
188.0.135.237:80
223.17.215.76:80
74.208.173.91:8080
192.241.220.183:8080
37.187.100.220:7080
66.61.94.36:80
172.96.190.154:8080
95.216.205.155:8080
177.94.227.143:80
222.159.240.58:80
188.251.213.180:443
37.46.129.215:8080
190.96.15.50:80
203.153.216.178:7080
195.201.56.70:8080
113.203.250.121:443
197.232.36.108:80
178.33.167.120:8080
175.139.144.229:8080
168.0.97.6:80
201.213.177.139:80
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 KBDKAZ.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\TsWpfWrp\KBDKAZ.exe f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2548 2148 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KBDKAZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2532 f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2532 f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe 2148 KBDKAZ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2148 2532 f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe 30 PID 2532 wrote to memory of 2148 2532 f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe 30 PID 2532 wrote to memory of 2148 2532 f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe 30 PID 2532 wrote to memory of 2148 2532 f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe 30 PID 2148 wrote to memory of 2548 2148 KBDKAZ.exe 31 PID 2148 wrote to memory of 2548 2148 KBDKAZ.exe 31 PID 2148 wrote to memory of 2548 2148 KBDKAZ.exe 31 PID 2148 wrote to memory of 2548 2148 KBDKAZ.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe"C:\Users\Admin\AppData\Local\Temp\f6a8c8f8f7695dcf2d1e2010c10fe5b0N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\TsWpfWrp\KBDKAZ.exe"C:\Windows\SysWOW64\TsWpfWrp\KBDKAZ.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 2163⤵
- Program crash
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f6a8c8f8f7695dcf2d1e2010c10fe5b0
SHA1f8258d1962d06814bc1af084118cea745813ff1e
SHA256e3a212f22c1e1bd5caccc3428fdab7e66d2dca43b4e2235dba26b9b0f166cdc2
SHA5127749d539e2dd19af4cb35eac97eafd4a9f88024c5a88839f8269e711f8b3dac81f2c2e7fe246054810e1ac05016926881bf5031046453217e6b8abbbbd5fd366