Analysis

  • max time kernel
    128s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 22:32

General

  • Target

    882d5d2253b95fed60f99a3b761b8c5091ee8ff60f4f1c2701a12cabc5314f0f.exe

  • Size

    176KB

  • MD5

    94e33d05b7d20457a60b4306f100d688

  • SHA1

    60bf2116232af78b92b5d641ef75a0b0f9837ad1

  • SHA256

    882d5d2253b95fed60f99a3b761b8c5091ee8ff60f4f1c2701a12cabc5314f0f

  • SHA512

    c90a3310440a64e82cbdffc488c7f44ae9638c1e47b46d388c5f8aa93500b4ba9e0083577681d4b5bead46b4409dde8d9e8cfbf5aa4d0979acd917d9b116a7d8

  • SSDEEP

    3072:RxFrVZ8wIRbLlPlJFpCXDC8uPF+qZqcLknKtntNf98JvpjQqDbfoF:RLr/8w2bLlNT8uPLxVtntNfWJvZQO

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

118.7.227.42:443

188.226.165.170:8080

188.40.170.197:80

51.38.50.144:8080

153.229.219.1:443

162.144.145.58:8080

126.126.139.26:443

85.246.78.192:80

177.130.51.198:80

42.200.96.63:80

73.55.128.120:80

113.203.238.130:80

202.29.237.113:8080

181.59.59.54:80

58.27.215.3:8080

60.108.128.186:80

190.192.39.136:80

185.63.32.149:80

50.116.78.109:8080

121.117.147.153:443

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Emotet payload 3 IoCs

    Detects Emotet payload in memory.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\882d5d2253b95fed60f99a3b761b8c5091ee8ff60f4f1c2701a12cabc5314f0f.exe
    "C:\Users\Admin\AppData\Local\Temp\882d5d2253b95fed60f99a3b761b8c5091ee8ff60f4f1c2701a12cabc5314f0f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3904-8-0x00000000005A0000-0x00000000005B2000-memory.dmp

    Filesize

    72KB

  • memory/3904-4-0x00000000008E0000-0x00000000008F3000-memory.dmp

    Filesize

    76KB

  • memory/3904-0-0x00000000005C0000-0x00000000005D5000-memory.dmp

    Filesize

    84KB