Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 21:16

General

  • Target

    281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80.exe

  • Size

    452KB

  • MD5

    e0c0ee2ac2bcc635fd784da1d6d7b88c

  • SHA1

    b07800b7d5cfc70b78c0f2ad6e56b18966f78f0c

  • SHA256

    281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80

  • SHA512

    cf59446cb09e6e5b7f896473f2de7f997f759d38528a499559e31a0e50505b383839ba8853d3287b2defe6b1b7264f7625ebd43ce86d818a247b44161bca914e

  • SSDEEP

    6144:+pD2qZxTRbeOvPuYQM6ILqruCjlpB+IszeczxGwsyc7I27iWgSbF:1oxT5nXzYQqrjzBvieEIiWhh

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

186.138.186.74:443

190.24.243.186:80

68.174.15.223:80

68.183.170.114:8080

45.79.95.107:443

192.241.143.52:8080

159.65.241.220:8080

142.93.114.137:8080

70.123.95.180:80

62.75.143.100:7080

91.242.136.103:80

109.169.86.13:8080

202.62.39.111:80

181.231.220.232:80

188.216.24.204:80

86.42.166.147:80

186.15.83.52:8080

178.79.163.131:8080

114.109.179.60:80

110.170.65.146:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80.exe
    "C:\Users\Admin\AppData\Local\Temp\281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\281caa686bf570f535bbf6cb094496186d839212236115e7e010e6a487c7aa80.exe
      --446ebb8d
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:1880
  • C:\Windows\SysWOW64\wmistrexce.exe
    "C:\Windows\SysWOW64\wmistrexce.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\wmistrexce.exe
      --909ca5
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/488-17-0x0000000000DE0000-0x0000000000DF6000-memory.dmp

    Filesize

    88KB

  • memory/628-11-0x0000000000DF0000-0x0000000000E06000-memory.dmp

    Filesize

    88KB

  • memory/1880-6-0x0000000002150000-0x0000000002166000-memory.dmp

    Filesize

    88KB

  • memory/1880-16-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/4280-5-0x00000000021D0000-0x00000000021E0000-memory.dmp

    Filesize

    64KB

  • memory/4280-0-0x0000000002200000-0x0000000002216000-memory.dmp

    Filesize

    88KB