Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 21:16

General

  • Target

    281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80.exe

  • Size

    452KB

  • MD5

    e0c0ee2ac2bcc635fd784da1d6d7b88c

  • SHA1

    b07800b7d5cfc70b78c0f2ad6e56b18966f78f0c

  • SHA256

    281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80

  • SHA512

    cf59446cb09e6e5b7f896473f2de7f997f759d38528a499559e31a0e50505b383839ba8853d3287b2defe6b1b7264f7625ebd43ce86d818a247b44161bca914e

  • SSDEEP

    6144:+pD2qZxTRbeOvPuYQM6ILqruCjlpB+IszeczxGwsyc7I27iWgSbF:1oxT5nXzYQqrjzBvieEIiWhh

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

186.138.186.74:443

190.24.243.186:80

68.174.15.223:80

68.183.170.114:8080

45.79.95.107:443

192.241.143.52:8080

159.65.241.220:8080

142.93.114.137:8080

70.123.95.180:80

62.75.143.100:7080

91.242.136.103:80

109.169.86.13:8080

202.62.39.111:80

181.231.220.232:80

188.216.24.204:80

86.42.166.147:80

186.15.83.52:8080

178.79.163.131:8080

114.109.179.60:80

110.170.65.146:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80.exe
    "C:\Users\Admin\AppData\Local\Temp\281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Users\Admin\AppData\Local\Temp\281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80.exe
      --446ebb8d
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:2104
  • C:\Windows\SysWOW64\violetellipse.exe
    "C:\Windows\SysWOW64\violetellipse.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\SysWOW64\violetellipse.exe
      --2978a955
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/320-0-0x00000000002B0000-0x00000000002C6000-memory.dmp

    Filesize

    88KB

  • memory/320-5-0x00000000002A0000-0x00000000002B0000-memory.dmp

    Filesize

    64KB

  • memory/2104-6-0x00000000002E0000-0x00000000002F6000-memory.dmp

    Filesize

    88KB

  • memory/2104-21-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2236-16-0x0000000000350000-0x0000000000366000-memory.dmp

    Filesize

    88KB

  • memory/2852-12-0x0000000000250000-0x0000000000266000-memory.dmp

    Filesize

    88KB