Analysis

  • max time kernel
    129s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 23:57

General

  • Target

    36cf95c257ec79534089c507ae5fe17aec95df2d5a8046116950e733d0cfad5c.exe

  • Size

    176KB

  • MD5

    ed9477f508cab2058ba6a8f2b1111a24

  • SHA1

    7022c345b827406e538e468d99dadb32a2347f4c

  • SHA256

    36cf95c257ec79534089c507ae5fe17aec95df2d5a8046116950e733d0cfad5c

  • SHA512

    723d0036e3b1c61aa3f20337206fb6df868ab7d681c630528efe4d813c1b8a5872482409c24767ee4cb11243ff33d51be7ec3453a492cd435fe5d020850ae7fa

  • SSDEEP

    3072:RxFrVZ8wIRbLlPlXFpCXDC8uPF+qZqcLknKtntNf98JvpjQqDbfoF:RLr/8w2bLlNd8uPLxVtntNfWJvZQO

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

118.7.227.42:443

188.226.165.170:8080

188.40.170.197:80

51.38.50.144:8080

153.229.219.1:443

162.144.145.58:8080

126.126.139.26:443

85.246.78.192:80

177.130.51.198:80

42.200.96.63:80

73.55.128.120:80

113.203.238.130:80

202.29.237.113:8080

181.59.59.54:80

58.27.215.3:8080

60.108.128.186:80

190.192.39.136:80

185.63.32.149:80

50.116.78.109:8080

121.117.147.153:443

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Emotet payload 3 IoCs

    Detects Emotet payload in memory.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36cf95c257ec79534089c507ae5fe17aec95df2d5a8046116950e733d0cfad5c.exe
    "C:\Users\Admin\AppData\Local\Temp\36cf95c257ec79534089c507ae5fe17aec95df2d5a8046116950e733d0cfad5c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2180-4-0x0000000000260000-0x0000000000273000-memory.dmp

    Filesize

    76KB

  • memory/2180-0-0x0000000000240000-0x0000000000255000-memory.dmp

    Filesize

    84KB

  • memory/2180-8-0x0000000000220000-0x0000000000232000-memory.dmp

    Filesize

    72KB