Overview
overview
10Static
static
30937008bee...8a.exe
windows7-x64
100937008bee...8a.exe
windows10-2004-x64
10187bc75717...20.exe
windows7-x64
10187bc75717...20.exe
windows10-2004-x64
101b2f450382...4b.exe
windows7-x64
101b2f450382...4b.exe
windows10-2004-x64
101f2be8e532...8f.exe
windows7-x64
101f2be8e532...8f.exe
windows10-2004-x64
102bc810b244...ee.exe
windows7-x64
102bc810b244...ee.exe
windows10-2004-x64
102bdca358c2...23.exe
windows7-x64
102bdca358c2...23.exe
windows10-2004-x64
103eefc2ad69...70.exe
windows7-x64
103eefc2ad69...70.exe
windows10-2004-x64
104a833f5daf...0a.exe
windows7-x64
104a833f5daf...0a.exe
windows10-2004-x64
1055149db482...ee.exe
windows7-x64
1055149db482...ee.exe
windows10-2004-x64
10579ec4d80e...ca.exe
windows7-x64
10579ec4d80e...ca.exe
windows10-2004-x64
10652d0ea3d4...b5.exe
windows7-x64
10652d0ea3d4...b5.exe
windows10-2004-x64
10663645874e...72.exe
windows7-x64
10663645874e...72.exe
windows10-2004-x64
10687e10aa4a...c1.exe
windows7-x64
10687e10aa4a...c1.exe
windows10-2004-x64
1071a0fca12f...9e.exe
windows7-x64
1071a0fca12f...9e.exe
windows10-2004-x64
107834499149...19.exe
windows7-x64
107834499149...19.exe
windows10-2004-x64
10923cd10ee8...78.exe
windows7-x64
10923cd10ee8...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
0937008bee11c456fb93fe4b92a0238a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0937008bee11c456fb93fe4b92a0238a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
187bc75717e926ed0a3380753fec6720.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
187bc75717e926ed0a3380753fec6720.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1b2f450382b4912c953ee26465fd8c4b.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
1b2f450382b4912c953ee26465fd8c4b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1f2be8e532057d96720885395b60a08f.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
1f2be8e532057d96720885395b60a08f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
2bc810b244cbe0d6b9511907f1a688ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
2bc810b244cbe0d6b9511907f1a688ee.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
2bdca358c2bcf8b3f4f54b34dd5a0723.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
2bdca358c2bcf8b3f4f54b34dd5a0723.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3eefc2ad6943e95f0307b50c37bb9970.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
3eefc2ad6943e95f0307b50c37bb9970.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
4a833f5dafe4b384b3f207f7c933950a.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
4a833f5dafe4b384b3f207f7c933950a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
55149db482552fee3ab1d44f416d4dee.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
55149db482552fee3ab1d44f416d4dee.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
579ec4d80e57f949e26ecb34f25fc9ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
579ec4d80e57f949e26ecb34f25fc9ca.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
652d0ea3d43ee4c6fb7f65e1e757e2b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
652d0ea3d43ee4c6fb7f65e1e757e2b5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
663645874e84c0d8293a0fd5147ca172.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
663645874e84c0d8293a0fd5147ca172.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
687e10aa4a6b00c729f884e8846a6cc1.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
687e10aa4a6b00c729f884e8846a6cc1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
71a0fca12f9b04118050ab4d92e58a9e.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
71a0fca12f9b04118050ab4d92e58a9e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7834499149add19c6c3507d0f2f31319.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7834499149add19c6c3507d0f2f31319.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
923cd10ee8d4aaaf7f366fcc17c89078.exe
Resource
win7-20240903-en
General
-
Target
2bc810b244cbe0d6b9511907f1a688ee.exe
-
Size
339KB
-
MD5
2bc810b244cbe0d6b9511907f1a688ee
-
SHA1
3ec9d02dd26354c1b06ad0fad5682a97438f0437
-
SHA256
1da71f037004d926716332d9835e29e586b383f90ae9cd83217d8312229a3dcb
-
SHA512
920f972e92552ce74e2e686bf640cd76d4b5fd5c452d6bc66a2c488d487611743f0679dcaf3bd9c268cee9792409e58f36d7f517937a68b76e17cfb03c7e97fa
-
SSDEEP
6144:6nrRBHo9fqy39CN0tavtrvUh6zS/VvPDIWE3F3HY0:6wqy46anzKV3DIB3F3HY
Malware Config
Extracted
emotet
Epoch1
190.96.15.50:80
192.175.111.214:8080
95.85.33.23:8080
192.232.229.54:7080
200.127.14.97:80
190.188.245.242:80
51.15.7.145:80
138.97.60.140:8080
98.13.75.196:80
213.52.74.198:80
74.58.215.226:80
192.81.38.31:80
191.182.6.118:80
212.71.237.140:8080
209.236.123.42:8080
60.93.23.51:80
178.211.45.66:8080
190.24.243.186:80
62.84.75.50:80
50.121.220.50:80
137.74.106.111:7080
68.183.170.114:8080
70.32.115.157:8080
189.2.177.210:443
177.23.7.151:80
24.232.228.233:80
81.215.230.173:443
51.75.33.127:80
35.143.99.174:80
170.81.48.2:80
177.129.17.170:443
5.196.35.138:7080
51.255.165.160:8080
216.47.196.104:80
185.94.252.12:80
70.169.17.134:80
46.101.58.37:8080
192.241.143.52:8080
219.92.13.25:80
172.104.169.32:8080
152.169.22.67:80
77.238.212.227:80
104.131.41.185:8080
74.135.120.91:80
51.38.124.206:80
186.103.141.250:443
181.30.61.163:443
85.214.26.7:8080
190.190.219.184:80
37.187.161.206:8080
87.106.46.107:8080
12.162.84.2:8080
5.189.178.202:8080
83.169.21.32:7080
185.183.16.47:80
111.67.12.221:8080
68.183.190.199:8080
109.190.35.249:80
128.92.203.42:80
138.97.60.141:7080
1.226.84.243:8080
188.157.101.114:80
45.46.37.97:80
46.43.2.95:8080
70.32.84.74:8080
174.118.202.24:443
213.197.182.158:8080
149.202.72.142:7080
12.163.208.58:80
50.28.51.143:8080
82.76.111.249:443
177.144.130.105:8080
105.209.235.113:8080
94.176.234.118:443
45.33.77.42:8080
202.134.4.210:7080
177.73.0.98:443
181.129.96.162:8080
51.15.7.189:80
217.13.106.14:8080
178.250.54.208:8080
185.94.252.27:443
177.74.228.34:80
188.135.15.49:80
5.89.33.136:80
46.105.114.137:8080
190.115.18.139:8080
64.201.88.132:80
183.176.82.231:80
186.70.127.199:8090
177.144.130.105:443
191.191.23.135:80
201.213.177.139:80
Signatures
-
Emotet family
-
resource yara_rule behavioral10/memory/2476-1-0x0000000002290000-0x00000000022AE000-memory.dmp emotet behavioral10/memory/2476-0-0x00000000022B0000-0x00000000022D0000-memory.dmp emotet behavioral10/memory/2476-5-0x00000000022F0000-0x000000000230F000-memory.dmp emotet behavioral10/memory/32-16-0x0000000002190000-0x00000000021AF000-memory.dmp emotet behavioral10/memory/32-11-0x0000000002170000-0x0000000002190000-memory.dmp emotet -
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral10/memory/2476-1-0x0000000002290000-0x00000000022AE000-memory.dmp dave -
Executes dropped EXE 1 IoCs
pid Process 32 aadWamExtension.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RdpSaPs\aadWamExtension.exe 2bc810b244cbe0d6b9511907f1a688ee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bc810b244cbe0d6b9511907f1a688ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadWamExtension.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe 32 aadWamExtension.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2476 2bc810b244cbe0d6b9511907f1a688ee.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2476 2bc810b244cbe0d6b9511907f1a688ee.exe 32 aadWamExtension.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2476 wrote to memory of 32 2476 2bc810b244cbe0d6b9511907f1a688ee.exe 82 PID 2476 wrote to memory of 32 2476 2bc810b244cbe0d6b9511907f1a688ee.exe 82 PID 2476 wrote to memory of 32 2476 2bc810b244cbe0d6b9511907f1a688ee.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bc810b244cbe0d6b9511907f1a688ee.exe"C:\Users\Admin\AppData\Local\Temp\2bc810b244cbe0d6b9511907f1a688ee.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\RdpSaPs\aadWamExtension.exe"C:\Windows\SysWOW64\RdpSaPs\aadWamExtension.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:32
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD52bc810b244cbe0d6b9511907f1a688ee
SHA13ec9d02dd26354c1b06ad0fad5682a97438f0437
SHA2561da71f037004d926716332d9835e29e586b383f90ae9cd83217d8312229a3dcb
SHA512920f972e92552ce74e2e686bf640cd76d4b5fd5c452d6bc66a2c488d487611743f0679dcaf3bd9c268cee9792409e58f36d7f517937a68b76e17cfb03c7e97fa