Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 00:19
Behavioral task
behavioral1
Sample
5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe
Resource
win7-20241010-en
General
-
Target
5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe
-
Size
114KB
-
MD5
a9d3f34894f9ddcb8cace7a8ad97f7b6
-
SHA1
1d75d8e3ca3fd211c5e41feb05f1b6c45d19fd1a
-
SHA256
5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb
-
SHA512
4129904df8eda3da3497a610a5e921a1c19c8c07e21e6dd8be2d1b6938a23305d1bb3ed8593625916cc3fa7d7d9d1c1e86e17ab11b28ab6b5970bb7e62256f1c
-
SSDEEP
3072:4PBI9iBSOX4XNt3poZxmNFsy2npe7QdP/VJ5J:wI9x/X/3po7+syMpbVVV
Malware Config
Extracted
emotet
Epoch1
189.173.113.67:443
200.123.101.90:80
170.130.31.177:8080
51.255.165.160:8080
45.56.79.249:443
185.86.148.222:8080
190.4.50.26:80
187.188.166.192:80
94.177.183.28:8080
201.213.32.59:80
76.69.29.42:80
190.96.118.15:443
81.213.215.216:50000
80.85.87.122:8080
186.1.41.111:443
183.82.97.25:80
220.241.38.226:50000
14.160.93.230:80
200.58.83.179:80
138.68.106.4:7080
77.245.101.134:8080
178.79.163.131:8080
200.113.106.18:80
181.16.17.210:443
190.146.131.105:8080
51.15.8.192:8080
45.79.95.107:443
79.127.57.43:80
88.250.223.190:8080
62.75.160.178:8080
46.101.212.195:8080
190.182.161.7:8080
77.55.211.77:8080
217.199.160.224:8080
163.172.40.218:7080
68.183.190.199:8080
212.71.237.140:8080
201.163.74.202:443
201.190.133.235:8080
91.83.93.124:7080
89.188.124.145:443
181.135.153.203:443
46.29.183.211:8080
94.183.71.206:7080
190.79.228.89:443
203.25.159.3:8080
207.154.204.40:8080
68.183.170.114:8080
139.5.237.27:443
62.75.143.100:7080
154.120.227.206:8080
144.139.158.155:80
109.169.86.13:8080
60.52.64.122:80
87.106.77.40:7080
142.93.114.137:8080
42.190.4.92:443
119.59.124.163:8080
82.196.15.205:8080
149.62.173.247:8080
46.28.111.142:7080
79.143.182.254:8080
190.38.14.52:80
81.169.140.14:443
46.41.151.103:8080
111.119.233.65:80
5.196.35.138:7080
69.163.33.84:8080
187.131.128.238:50000
86.42.166.147:80
178.249.187.151:8080
159.203.204.126:8080
41.75.135.93:7080
91.205.215.57:7080
186.23.132.93:990
50.28.51.143:8080
190.97.30.167:990
91.204.163.19:8090
104.131.58.132:8080
190.210.184.138:995
Signatures
-
Emotet family
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ceipmarkup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ceipmarkup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 ceipmarkup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ceipmarkup.exe -
resource yara_rule behavioral2/memory/2732-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2732-9-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/452-7-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/452-21-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/888-23-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/452-25-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4944-32-0x0000000000400000-0x000000000043B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceipmarkup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceipmarkup.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs ceipmarkup.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust ceipmarkup.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ceipmarkup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs ceipmarkup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ceipmarkup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs ceipmarkup.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs ceipmarkup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates ceipmarkup.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe 4944 ceipmarkup.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 452 5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2732 wrote to memory of 452 2732 5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe 82 PID 2732 wrote to memory of 452 2732 5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe 82 PID 2732 wrote to memory of 452 2732 5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe 82 PID 888 wrote to memory of 4944 888 ceipmarkup.exe 84 PID 888 wrote to memory of 4944 888 ceipmarkup.exe 84 PID 888 wrote to memory of 4944 888 ceipmarkup.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe"C:\Users\Admin\AppData\Local\Temp\5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\5b29b1dbb41d7cbabacabc772f05c98bf661e8b9347b37f6ebdb5d2a58d3decb.exe--1f6cc0cc2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:452
-
-
C:\Windows\SysWOW64\ceipmarkup.exe"C:\Windows\SysWOW64\ceipmarkup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\ceipmarkup.exe--7a6c73032⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\2c6362131653a9371e2c8ca40b539097_cca0d105-8260-4611-8c12-bd85a7208b9f
Filesize50B
MD5831008e4b73dc813638b50df0b3fa55c
SHA1ca163c72a05bef4e5c553c016d35b27a416c0cf4
SHA2565bceedfa1c7a34555bfdad426d156613d75dac1c35a4e3855aa632167e97f2a8
SHA512c12b018eba9cf823e9c2527524ad09133af007e40444a00488fcdbe4b0c429b167ee21ecceede5ad23dea9543df4111bc47b684831b1e77c5c1ac0363bdac195