Overview
overview
10Static
static
30937008bee...8a.exe
windows7-x64
100937008bee...8a.exe
windows10-2004-x64
10187bc75717...20.exe
windows7-x64
10187bc75717...20.exe
windows10-2004-x64
101b2f450382...4b.exe
windows7-x64
101b2f450382...4b.exe
windows10-2004-x64
101f2be8e532...8f.exe
windows7-x64
101f2be8e532...8f.exe
windows10-2004-x64
102bc810b244...ee.exe
windows7-x64
102bc810b244...ee.exe
windows10-2004-x64
102bdca358c2...23.exe
windows7-x64
102bdca358c2...23.exe
windows10-2004-x64
103eefc2ad69...70.exe
windows7-x64
103eefc2ad69...70.exe
windows10-2004-x64
104a833f5daf...0a.exe
windows7-x64
104a833f5daf...0a.exe
windows10-2004-x64
1055149db482...ee.exe
windows7-x64
1055149db482...ee.exe
windows10-2004-x64
10579ec4d80e...ca.exe
windows7-x64
10579ec4d80e...ca.exe
windows10-2004-x64
10652d0ea3d4...b5.exe
windows7-x64
10652d0ea3d4...b5.exe
windows10-2004-x64
10663645874e...72.exe
windows7-x64
10663645874e...72.exe
windows10-2004-x64
10687e10aa4a...c1.exe
windows7-x64
10687e10aa4a...c1.exe
windows10-2004-x64
1071a0fca12f...9e.exe
windows7-x64
1071a0fca12f...9e.exe
windows10-2004-x64
107834499149...19.exe
windows7-x64
107834499149...19.exe
windows10-2004-x64
10923cd10ee8...78.exe
windows7-x64
10923cd10ee8...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
0937008bee11c456fb93fe4b92a0238a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0937008bee11c456fb93fe4b92a0238a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
187bc75717e926ed0a3380753fec6720.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
187bc75717e926ed0a3380753fec6720.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1b2f450382b4912c953ee26465fd8c4b.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
1b2f450382b4912c953ee26465fd8c4b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1f2be8e532057d96720885395b60a08f.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
1f2be8e532057d96720885395b60a08f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
2bc810b244cbe0d6b9511907f1a688ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
2bc810b244cbe0d6b9511907f1a688ee.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
2bdca358c2bcf8b3f4f54b34dd5a0723.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
2bdca358c2bcf8b3f4f54b34dd5a0723.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3eefc2ad6943e95f0307b50c37bb9970.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
3eefc2ad6943e95f0307b50c37bb9970.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
4a833f5dafe4b384b3f207f7c933950a.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
4a833f5dafe4b384b3f207f7c933950a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
55149db482552fee3ab1d44f416d4dee.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
55149db482552fee3ab1d44f416d4dee.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
579ec4d80e57f949e26ecb34f25fc9ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
579ec4d80e57f949e26ecb34f25fc9ca.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
652d0ea3d43ee4c6fb7f65e1e757e2b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
652d0ea3d43ee4c6fb7f65e1e757e2b5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
663645874e84c0d8293a0fd5147ca172.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
663645874e84c0d8293a0fd5147ca172.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
687e10aa4a6b00c729f884e8846a6cc1.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
687e10aa4a6b00c729f884e8846a6cc1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
71a0fca12f9b04118050ab4d92e58a9e.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
71a0fca12f9b04118050ab4d92e58a9e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7834499149add19c6c3507d0f2f31319.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7834499149add19c6c3507d0f2f31319.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
923cd10ee8d4aaaf7f366fcc17c89078.exe
Resource
win7-20240903-en
General
-
Target
652d0ea3d43ee4c6fb7f65e1e757e2b5.exe
-
Size
339KB
-
MD5
652d0ea3d43ee4c6fb7f65e1e757e2b5
-
SHA1
55ea15cdcf721750582060155e613aeebf43f1eb
-
SHA256
25aba3ca6fa578be93b2c34a2b85457390bbddc901de49001aaf2fabd68fbfed
-
SHA512
12c39120f022204f060595c2498eed3e293b8c56b20decbbd7440d03ff4b86ad3e93e4bf9b96dbc4d2e4dd04b387db232551f6cced4f20cb5a9c88390a5b99b6
-
SSDEEP
6144:6nrRBHo9fqy39CN0tavtFvUh6zS/VvPDIWE3F3HY0:6wqy46aRzKV3DIB3F3HY
Malware Config
Extracted
emotet
Epoch1
190.96.15.50:80
192.175.111.214:8080
95.85.33.23:8080
192.232.229.54:7080
200.127.14.97:80
190.188.245.242:80
51.15.7.145:80
138.97.60.140:8080
98.13.75.196:80
213.52.74.198:80
74.58.215.226:80
192.81.38.31:80
191.182.6.118:80
212.71.237.140:8080
209.236.123.42:8080
60.93.23.51:80
178.211.45.66:8080
190.24.243.186:80
62.84.75.50:80
50.121.220.50:80
137.74.106.111:7080
68.183.170.114:8080
70.32.115.157:8080
189.2.177.210:443
177.23.7.151:80
24.232.228.233:80
81.215.230.173:443
51.75.33.127:80
35.143.99.174:80
170.81.48.2:80
177.129.17.170:443
5.196.35.138:7080
51.255.165.160:8080
216.47.196.104:80
185.94.252.12:80
70.169.17.134:80
46.101.58.37:8080
192.241.143.52:8080
219.92.13.25:80
172.104.169.32:8080
152.169.22.67:80
77.238.212.227:80
104.131.41.185:8080
74.135.120.91:80
51.38.124.206:80
186.103.141.250:443
181.30.61.163:443
85.214.26.7:8080
190.190.219.184:80
37.187.161.206:8080
87.106.46.107:8080
12.162.84.2:8080
5.189.178.202:8080
83.169.21.32:7080
185.183.16.47:80
111.67.12.221:8080
68.183.190.199:8080
109.190.35.249:80
128.92.203.42:80
138.97.60.141:7080
1.226.84.243:8080
188.157.101.114:80
45.46.37.97:80
46.43.2.95:8080
70.32.84.74:8080
174.118.202.24:443
213.197.182.158:8080
149.202.72.142:7080
12.163.208.58:80
50.28.51.143:8080
82.76.111.249:443
177.144.130.105:8080
105.209.235.113:8080
94.176.234.118:443
45.33.77.42:8080
202.134.4.210:7080
177.73.0.98:443
181.129.96.162:8080
51.15.7.189:80
217.13.106.14:8080
178.250.54.208:8080
185.94.252.27:443
177.74.228.34:80
188.135.15.49:80
5.89.33.136:80
46.105.114.137:8080
190.115.18.139:8080
64.201.88.132:80
183.176.82.231:80
186.70.127.199:8090
177.144.130.105:443
191.191.23.135:80
201.213.177.139:80
Signatures
-
Emotet family
-
resource yara_rule behavioral21/memory/1624-4-0x00000000003D0000-0x00000000003EF000-memory.dmp emotet behavioral21/memory/1624-0-0x00000000002B0000-0x00000000002D0000-memory.dmp emotet behavioral21/memory/1624-8-0x0000000000290000-0x00000000002AE000-memory.dmp emotet behavioral21/memory/2340-15-0x00000000003E0000-0x00000000003FF000-memory.dmp emotet behavioral21/memory/2340-11-0x00000000003C0000-0x00000000003E0000-memory.dmp emotet -
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral21/memory/1624-8-0x0000000000290000-0x00000000002AE000-memory.dmp dave -
Executes dropped EXE 1 IoCs
pid Process 2340 jscript9.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RunLegacyCPLElevated\jscript9.exe 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jscript9.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2340 jscript9.exe 2340 jscript9.exe 2340 jscript9.exe 2340 jscript9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1624 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1624 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe 2340 jscript9.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2340 1624 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe 31 PID 1624 wrote to memory of 2340 1624 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe 31 PID 1624 wrote to memory of 2340 1624 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe 31 PID 1624 wrote to memory of 2340 1624 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe 31 PID 1624 wrote to memory of 2340 1624 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe 31 PID 1624 wrote to memory of 2340 1624 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe 31 PID 1624 wrote to memory of 2340 1624 652d0ea3d43ee4c6fb7f65e1e757e2b5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\652d0ea3d43ee4c6fb7f65e1e757e2b5.exe"C:\Users\Admin\AppData\Local\Temp\652d0ea3d43ee4c6fb7f65e1e757e2b5.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\RunLegacyCPLElevated\jscript9.exe"C:\Windows\SysWOW64\RunLegacyCPLElevated\jscript9.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD5652d0ea3d43ee4c6fb7f65e1e757e2b5
SHA155ea15cdcf721750582060155e613aeebf43f1eb
SHA25625aba3ca6fa578be93b2c34a2b85457390bbddc901de49001aaf2fabd68fbfed
SHA51212c39120f022204f060595c2498eed3e293b8c56b20decbbd7440d03ff4b86ad3e93e4bf9b96dbc4d2e4dd04b387db232551f6cced4f20cb5a9c88390a5b99b6