Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/12/2024, 01:50
Behavioral task
behavioral1
Sample
7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe
Resource
win7-20240903-en
General
-
Target
7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe
-
Size
114KB
-
MD5
b32879e40e9a61421131dc091c6d78a0
-
SHA1
49a449b396b6c422dfa699e82711aff4b796ddd1
-
SHA256
7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661
-
SHA512
4b1d71c5f2932384298134e670f3ee816cea8f776bb8c243e36d7db467376c08fabb79d929a755b7688a225dd75af60cb7ee5c1725123a8b238a9375c1f3368c
-
SSDEEP
3072:4PBI9iBSOX4XNt3poZxmNFsy2npe7QdP/VJ5L:wI9x/X/3po7+syMpbVVP
Malware Config
Extracted
emotet
Epoch1
189.173.113.67:443
200.123.101.90:80
170.130.31.177:8080
51.255.165.160:8080
45.56.79.249:443
185.86.148.222:8080
190.4.50.26:80
187.188.166.192:80
94.177.183.28:8080
201.213.32.59:80
76.69.29.42:80
190.96.118.15:443
81.213.215.216:50000
80.85.87.122:8080
186.1.41.111:443
183.82.97.25:80
220.241.38.226:50000
14.160.93.230:80
200.58.83.179:80
138.68.106.4:7080
77.245.101.134:8080
178.79.163.131:8080
200.113.106.18:80
181.16.17.210:443
190.146.131.105:8080
51.15.8.192:8080
45.79.95.107:443
79.127.57.43:80
88.250.223.190:8080
62.75.160.178:8080
46.101.212.195:8080
190.182.161.7:8080
77.55.211.77:8080
217.199.160.224:8080
163.172.40.218:7080
68.183.190.199:8080
212.71.237.140:8080
201.163.74.202:443
201.190.133.235:8080
91.83.93.124:7080
89.188.124.145:443
181.135.153.203:443
46.29.183.211:8080
94.183.71.206:7080
190.79.228.89:443
203.25.159.3:8080
207.154.204.40:8080
68.183.170.114:8080
139.5.237.27:443
62.75.143.100:7080
154.120.227.206:8080
144.139.158.155:80
109.169.86.13:8080
60.52.64.122:80
87.106.77.40:7080
142.93.114.137:8080
42.190.4.92:443
119.59.124.163:8080
82.196.15.205:8080
149.62.173.247:8080
46.28.111.142:7080
79.143.182.254:8080
190.38.14.52:80
81.169.140.14:443
46.41.151.103:8080
111.119.233.65:80
5.196.35.138:7080
69.163.33.84:8080
187.131.128.238:50000
86.42.166.147:80
178.249.187.151:8080
159.203.204.126:8080
41.75.135.93:7080
91.205.215.57:7080
186.23.132.93:990
50.28.51.143:8080
190.97.30.167:990
91.204.163.19:8090
104.131.58.132:8080
190.210.184.138:995
Signatures
-
Emotet family
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat storemouse.exe -
resource yara_rule behavioral1/memory/3048-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3048-7-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2692-9-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2816-22-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2692-24-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2760-30-0x0000000000400000-0x000000000043B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language storemouse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language storemouse.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix storemouse.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" storemouse.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad storemouse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 storemouse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-96-df-d6-e6-fd\WpadDecisionReason = "1" storemouse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-96-df-d6-e6-fd\WpadDecisionTime = 30cd8770b851db01 storemouse.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings storemouse.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections storemouse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-96-df-d6-e6-fd\WpadDecision = "0" storemouse.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings storemouse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" storemouse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 storemouse.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{938E8C25-2583-4F91-A636-4D8D208AB044} storemouse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{938E8C25-2583-4F91-A636-4D8D208AB044}\WpadDecisionReason = "1" storemouse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{938E8C25-2583-4F91-A636-4D8D208AB044}\WpadDecisionTime = 30cd8770b851db01 storemouse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 storemouse.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" storemouse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{938E8C25-2583-4F91-A636-4D8D208AB044}\WpadDecision = "0" storemouse.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{938E8C25-2583-4F91-A636-4D8D208AB044}\WpadNetworkName = "Network 3" storemouse.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-96-df-d6-e6-fd storemouse.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{938E8C25-2583-4F91-A636-4D8D208AB044}\8e-96-df-d6-e6-fd storemouse.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2760 storemouse.exe 2760 storemouse.exe 2760 storemouse.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2692 7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2692 3048 7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe 30 PID 3048 wrote to memory of 2692 3048 7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe 30 PID 3048 wrote to memory of 2692 3048 7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe 30 PID 3048 wrote to memory of 2692 3048 7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe 30 PID 2816 wrote to memory of 2760 2816 storemouse.exe 32 PID 2816 wrote to memory of 2760 2816 storemouse.exe 32 PID 2816 wrote to memory of 2760 2816 storemouse.exe 32 PID 2816 wrote to memory of 2760 2816 storemouse.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe"C:\Users\Admin\AppData\Local\Temp\7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\7b57b090f403a29838bab33fd64006d11a433f54805ad244c0496c26522cf661N.exe--2afa1d472⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2692
-
-
C:\Windows\SysWOW64\storemouse.exe"C:\Windows\SysWOW64\storemouse.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\storemouse.exe--71b59fd62⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2760
-