Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
31-10-2024 15:15
Static task
static1
Behavioral task
behavioral1
Sample
cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe
-
Size
852KB
-
MD5
88e89512a55889d7431c1f53f53bed98
-
SHA1
5b8058e9f9b630ba53ad6b0f428e67f03080e7fe
-
SHA256
cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde
-
SHA512
b37358eb33998ba2a739e1f67f518d40ea64de8427af285139e59d071b5799465dfadecbd6df714468a93d23620fb1ee71ab28fc8fa61546f3f35d63ac78d57f
-
SSDEEP
12288:Sp63KfH3sS7wyEkf2vy/x2IuOR/qBdDDzs8cmS:Sl3sswyEklp2yRyBd9
Malware Config
Extracted
emotet
Epoch2
47.146.32.175:80
212.51.142.238:8080
200.55.243.138:8080
114.146.222.200:80
153.126.210.205:7080
121.124.124.40:7080
222.214.218.37:4143
67.241.24.163:8080
180.92.239.110:8080
203.153.216.189:7080
119.198.40.179:80
70.167.215.250:8080
168.235.67.138:7080
190.55.181.54:443
139.59.60.244:8080
189.212.199.126:443
78.24.219.147:8080
61.19.246.238:443
137.59.187.107:8080
87.106.139.101:8080
47.146.117.214:80
201.173.217.124:443
91.231.166.124:8080
181.230.116.163:80
103.86.49.11:8080
47.153.182.47:80
72.12.127.184:443
76.27.179.47:80
83.110.223.58:443
91.211.88.52:7080
204.197.146.48:80
162.241.92.219:8080
79.98.24.39:8080
65.111.120.223:80
37.139.21.175:8080
139.130.242.43:80
157.147.76.151:80
104.131.44.150:8080
104.131.11.150:443
183.101.175.193:80
113.160.130.116:8443
41.60.200.34:80
109.74.5.95:8080
190.160.53.126:80
87.106.136.232:8080
46.105.131.79:8080
157.245.99.39:8080
62.138.26.28:8080
185.94.252.104:443
165.165.171.160:8080
75.139.38.211:80
116.203.32.252:8080
142.105.151.124:443
50.116.86.205:8080
176.111.60.55:8080
93.51.50.171:8080
37.187.72.193:8080
81.2.235.111:8080
5.39.91.110:7080
124.45.106.173:443
24.234.133.205:80
209.141.54.221:8080
110.145.77.103:80
5.196.74.210:8080
200.41.121.90:80
62.75.141.82:80
95.179.229.244:8080
24.179.13.119:80
74.208.45.104:8080
104.236.246.93:8080
47.144.21.12:443
24.43.99.75:80
95.213.236.64:8080
169.239.182.217:8080
209.182.216.177:443
152.168.248.128:443
Signatures
-
Emotet family
-
resource yara_rule behavioral3/memory/3760-1-0x0000000002220000-0x000000000222C000-memory.dmp emotet behavioral3/memory/4688-9-0x0000000000640000-0x000000000064C000-memory.dmp emotet behavioral3/memory/4688-13-0x0000000000760000-0x0000000000860000-memory.dmp emotet behavioral3/memory/4688-14-0x0000000000640000-0x000000000064C000-memory.dmp emotet behavioral3/memory/4688-15-0x0000000000760000-0x0000000000860000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 4688 weretw.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\KBDA2\weretw.exe cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weretw.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe 4688 weretw.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3760 cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3760 cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe 4688 weretw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3760 wrote to memory of 4688 3760 cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe 81 PID 3760 wrote to memory of 4688 3760 cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe 81 PID 3760 wrote to memory of 4688 3760 cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe"C:\Users\Admin\AppData\Local\Temp\cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\KBDA2\weretw.exe"C:\Windows\SysWOW64\KBDA2\weretw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852KB
MD588e89512a55889d7431c1f53f53bed98
SHA15b8058e9f9b630ba53ad6b0f428e67f03080e7fe
SHA256cf253cb0546beb4fb9e65af62c7126ef15c4ec1a40f358d1962276bbb8e90bde
SHA512b37358eb33998ba2a739e1f67f518d40ea64de8427af285139e59d071b5799465dfadecbd6df714468a93d23620fb1ee71ab28fc8fa61546f3f35d63ac78d57f