Overview
overview
10Static
static
100486218577...d9.exe
windows7-x64
109bfd15145...11.exe
windows7-x64
9141d93e2d4...aa.exe
windows7-x64
1016c2807567...55.exe
windows7-x64
32f41c73046...95.exe
windows7-x64
103e275093a5...01.exe
windows7-x64
10419a809f42...89.exe
windows7-x64
34b10fd0d5e...58.exe
windows7-x64
104d78c439ed...f7.exe
windows7-x64
74f7713dcf8...63.exe
windows7-x64
7597deecbe6...4d.exe
windows7-x64
76b59edf464...e8.exe
windows7-x64
87def3cd43d...d8.exe
windows7-x64
796ba85326e...8a.exe
windows7-x64
797f1b6afb2...2e.exe
windows7-x64
59906747639...1e.exe
windows7-x64
19e1609ab7f...08.exe
windows7-x64
10b7fc91fc1f...37.exe
windows7-x64
7bf179bbd2c...25.exe
windows7-x64
3cfc68c40f4...4f.exe
windows7-x64
6e6e948a0aa...eb.exe
windows7-x64
1f02fe52119...68.exe
windows7-x64
8$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows7-x64
3secrehosted.exe
windows7-x64
3Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 09:28
Behavioral task
behavioral1
Sample
04862185775476ae0b6f7e8a02133cb408d212ca17bbff5c20dcfdcf569b3dd9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
09bfd15145c9d8e39f99d3dfe98337a8c488dc334dfe195d27bdeb5b2459fd11.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
141d93e2d408738bba4f523f60d6ead702424e7d62c34921c8a34150a31870aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
16c2807567b31c30288d92c0649ce78ea87434104bac72db407bb45bf65a4855.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
2f41c73046f3b0f5edd79ae089b6b64ec3a0812ea02fe7325b8e5b171a621c95.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
3e275093a5ad4b2083eda47dfd2e9053cae044f7990a323c6f649093a8d00901.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
419a809f42361b2fcff98eb6f201e54ecef532c9b378db06e999f54285032889.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
4d78c439ed8860a14aebcf79dfef27047a51fc36c514b40b48724cd9340ff6f7.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
597deecbe673c67d998825bdf4ddeca83f6fbb3bdccec91dabf4f9052713ac4d.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
6b59edf464eaaeac4f4b2f43474e573694429f08c448db770618dc574b6171e8.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
7def3cd43d98a30a04f09be284cab8b8dbf96ecc2e78302f6c45ad524c41d7d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
96ba85326e2250f4e1cf07f5981bb96ea1383901663a6354899b5da0cd77b98a.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
97f1b6afb24cda22203275fc34bd07ba51170729edba8ee67bdb66a529574a2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
9906747639b782d738555a2522acd4a09ca8a3356f7848a4e68f284d888d891e.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
9e1609ab7f01b56a9476494d9b3bf5997380d466744b07ec5d9b20e416b10f08.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
b7fc91fc1fa6a53b1e5d97e21a7abefbde3ca7349d4db0fdbe15ec2702b1b737.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
bf179bbd2ce7ca31e421334efa7d262e30dc16b9bb5cced1b8b18d119adc4425.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
e6e948a0aa3605bbd636ccdfa56e771dfebafa1e150d84f96b1968f8803edbeb.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
f02fe52119ff47fed2e52b28ec2c42a8eae8233b4c588c310dbaef3297b5d768.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20241010-en
Behavioral task
behavioral25
Sample
secrehosted.exe
Resource
win7-20240903-en
General
-
Target
4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe
-
Size
624KB
-
MD5
b9ea663ffcfe1152bd6e9a452a4eaf14
-
SHA1
e45d164dfab4898baefa313ee53c360a7e850f30
-
SHA256
4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358
-
SHA512
8fb37dc3ad80f46e83785988037a6f1801e4f326f23b1584bb3b3b4e58d7a489b55322e8ba2a8eba4ab627462802aadb83c3f392c6b3f4f32f0741ee675c0c5f
-
SSDEEP
6144:hzTCYruA1ohrPv8FG0+DVg5w83gSkdwPU0YnG3Fx+GaJ5674pIbVg73zf7ewvNwq:hzBCAnFfG83qEU0YGTcJ47Fmreu+Du
Malware Config
Extracted
emotet
Epoch2
24.196.49.98:80
93.147.141.5:443
72.189.57.105:80
91.250.96.22:8080
37.187.72.193:8080
104.131.44.150:8080
167.71.10.37:8080
27.109.153.201:8090
105.247.123.133:8080
190.12.119.180:443
120.151.135.224:80
221.165.123.72:80
103.86.49.11:8080
178.237.139.83:8080
5.32.55.214:80
95.213.236.64:8080
189.203.177.41:443
78.24.219.147:8080
190.117.226.104:80
73.11.153.178:8080
195.244.215.206:80
192.241.255.77:8080
24.105.202.216:443
50.116.86.205:8080
41.60.200.34:80
70.175.171.251:80
182.176.132.213:8090
45.51.40.140:80
201.184.105.242:443
47.180.91.213:80
159.65.25.128:8080
173.21.26.90:80
79.159.249.152:80
66.34.201.20:7080
62.75.187.192:8080
180.92.239.110:8080
178.153.176.124:80
115.95.6.218:443
24.94.237.248:80
181.143.126.170:80
210.6.85.121:80
197.89.27.26:8080
98.30.113.161:80
201.173.217.124:443
98.174.166.205:80
91.205.215.66:443
2.237.76.249:80
92.222.216.44:8080
209.97.168.52:8080
200.21.90.5:443
66.7.242.50:8080
5.154.58.24:80
31.31.77.83:443
59.103.164.174:80
37.157.194.134:443
110.36.217.66:8080
46.105.131.87:80
181.126.70.117:80
209.146.22.34:443
160.16.215.66:8080
5.196.74.210:8080
190.146.205.227:8080
169.239.182.217:8080
190.220.19.82:443
121.88.5.176:443
104.131.11.150:8080
190.53.135.159:21
200.116.145.225:443
47.6.15.79:80
87.106.139.101:8080
91.73.197.90:80
24.164.79.147:8080
139.130.242.43:80
62.75.141.82:80
58.171.42.66:8080
62.138.26.28:8080
211.63.71.72:8080
190.117.126.169:80
47.6.15.79:443
78.189.180.107:80
173.66.96.135:80
108.191.2.72:80
47.156.70.145:80
183.102.238.69:465
46.105.131.69:443
64.53.242.181:8080
78.186.5.109:443
205.185.117.108:8080
201.229.45.222:8080
209.141.54.221:8080
110.142.38.16:80
110.143.84.202:80
70.169.53.234:80
98.156.206.153:80
85.67.10.190:80
78.142.114.69:80
179.13.185.19:80
120.150.246.241:80
223.197.185.60:80
139.130.241.252:443
88.249.120.205:80
206.81.10.215:8080
31.172.240.91:8080
206.189.112.148:8080
72.186.137.156:80
104.236.246.93:8080
186.86.247.171:443
45.33.49.124:443
105.27.155.182:80
176.106.183.253:8080
177.239.160.121:80
95.128.43.213:8080
47.153.183.211:80
149.202.153.252:8080
190.55.181.54:443
87.106.136.232:8080
37.139.21.175:8080
60.231.217.199:8080
108.179.206.219:8080
87.230.19.21:8080
70.46.247.81:80
217.160.182.191:8080
188.0.135.237:80
Signatures
-
Emotet family
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat deployboost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deployboost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deployboost.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" deployboost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings deployboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DAC19DB6-26F7-4B6F-AFA3-F62EBEE73BC8}\WpadDecision = "0" deployboost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-f9-26-7f-9d-2f deployboost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DAC19DB6-26F7-4B6F-AFA3-F62EBEE73BC8}\ca-f9-26-7f-9d-2f deployboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-f9-26-7f-9d-2f\WpadDecision = "0" deployboost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings deployboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 deployboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" deployboost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad deployboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0169000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 deployboost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DAC19DB6-26F7-4B6F-AFA3-F62EBEE73BC8} deployboost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections deployboost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix deployboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 deployboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DAC19DB6-26F7-4B6F-AFA3-F62EBEE73BC8}\WpadDecisionTime = d0514f80af40db01 deployboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-f9-26-7f-9d-2f\WpadDecisionTime = d0514f80af40db01 deployboost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" deployboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DAC19DB6-26F7-4B6F-AFA3-F62EBEE73BC8}\WpadDecisionReason = "1" deployboost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DAC19DB6-26F7-4B6F-AFA3-F62EBEE73BC8}\WpadNetworkName = "Network 3" deployboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-f9-26-7f-9d-2f\WpadDecisionReason = "1" deployboost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2772 deployboost.exe 2772 deployboost.exe 2772 deployboost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1684 4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2148 4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe 1684 4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe 2220 deployboost.exe 2772 deployboost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1684 2148 4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe 30 PID 2148 wrote to memory of 1684 2148 4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe 30 PID 2148 wrote to memory of 1684 2148 4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe 30 PID 2148 wrote to memory of 1684 2148 4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe 30 PID 2220 wrote to memory of 2772 2220 deployboost.exe 33 PID 2220 wrote to memory of 2772 2220 deployboost.exe 33 PID 2220 wrote to memory of 2772 2220 deployboost.exe 33 PID 2220 wrote to memory of 2772 2220 deployboost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe"C:\Users\Admin\AppData\Local\Temp\4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe--e339803b2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
C:\Windows\SysWOW64\deployboost.exe"C:\Windows\SysWOW64\deployboost.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\deployboost.exe--d7aabe922⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2772
-