Overview
overview
10Static
static
30937008bee...8a.exe
windows7-x64
100937008bee...8a.exe
windows10-2004-x64
10187bc75717...20.exe
windows7-x64
10187bc75717...20.exe
windows10-2004-x64
101b2f450382...4b.exe
windows7-x64
101b2f450382...4b.exe
windows10-2004-x64
101f2be8e532...8f.exe
windows7-x64
101f2be8e532...8f.exe
windows10-2004-x64
102bc810b244...ee.exe
windows7-x64
102bc810b244...ee.exe
windows10-2004-x64
102bdca358c2...23.exe
windows7-x64
102bdca358c2...23.exe
windows10-2004-x64
103eefc2ad69...70.exe
windows7-x64
103eefc2ad69...70.exe
windows10-2004-x64
104a833f5daf...0a.exe
windows7-x64
104a833f5daf...0a.exe
windows10-2004-x64
1055149db482...ee.exe
windows7-x64
1055149db482...ee.exe
windows10-2004-x64
10579ec4d80e...ca.exe
windows7-x64
10579ec4d80e...ca.exe
windows10-2004-x64
10652d0ea3d4...b5.exe
windows7-x64
10652d0ea3d4...b5.exe
windows10-2004-x64
10663645874e...72.exe
windows7-x64
10663645874e...72.exe
windows10-2004-x64
10687e10aa4a...c1.exe
windows7-x64
10687e10aa4a...c1.exe
windows10-2004-x64
1071a0fca12f...9e.exe
windows7-x64
1071a0fca12f...9e.exe
windows10-2004-x64
107834499149...19.exe
windows7-x64
107834499149...19.exe
windows10-2004-x64
10923cd10ee8...78.exe
windows7-x64
10923cd10ee8...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
0937008bee11c456fb93fe4b92a0238a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0937008bee11c456fb93fe4b92a0238a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
187bc75717e926ed0a3380753fec6720.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
187bc75717e926ed0a3380753fec6720.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1b2f450382b4912c953ee26465fd8c4b.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
1b2f450382b4912c953ee26465fd8c4b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1f2be8e532057d96720885395b60a08f.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
1f2be8e532057d96720885395b60a08f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
2bc810b244cbe0d6b9511907f1a688ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
2bc810b244cbe0d6b9511907f1a688ee.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
2bdca358c2bcf8b3f4f54b34dd5a0723.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
2bdca358c2bcf8b3f4f54b34dd5a0723.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3eefc2ad6943e95f0307b50c37bb9970.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
3eefc2ad6943e95f0307b50c37bb9970.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
4a833f5dafe4b384b3f207f7c933950a.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
4a833f5dafe4b384b3f207f7c933950a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
55149db482552fee3ab1d44f416d4dee.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
55149db482552fee3ab1d44f416d4dee.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
579ec4d80e57f949e26ecb34f25fc9ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
579ec4d80e57f949e26ecb34f25fc9ca.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
652d0ea3d43ee4c6fb7f65e1e757e2b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
652d0ea3d43ee4c6fb7f65e1e757e2b5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
663645874e84c0d8293a0fd5147ca172.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
663645874e84c0d8293a0fd5147ca172.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
687e10aa4a6b00c729f884e8846a6cc1.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
687e10aa4a6b00c729f884e8846a6cc1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
71a0fca12f9b04118050ab4d92e58a9e.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
71a0fca12f9b04118050ab4d92e58a9e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7834499149add19c6c3507d0f2f31319.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7834499149add19c6c3507d0f2f31319.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
923cd10ee8d4aaaf7f366fcc17c89078.exe
Resource
win7-20240903-en
General
-
Target
7834499149add19c6c3507d0f2f31319.exe
-
Size
457KB
-
MD5
7834499149add19c6c3507d0f2f31319
-
SHA1
3f7eba783edef4988692355e4c7f617a34fa59d4
-
SHA256
ea7191957590892433a40deb9421352a5dda21500e611eff8f810c71ebd2942a
-
SHA512
740fecdd3c684f3199f4923d47d67db3188434591d8ece39a18ae65a160ce4f5d7fd3d8f88b29aff795e9312d95eb05da8391340cfd109b05d26d071c18e6f81
-
SSDEEP
12288:QCeRhmZzvnDrcmacsitPbD5bZy6dFDHvTzT29cq:dFvXvfumVLP29cq
Malware Config
Extracted
emotet
Epoch1
190.96.15.50:80
192.175.111.214:8080
95.85.33.23:8080
192.232.229.54:7080
200.127.14.97:80
190.188.245.242:80
51.15.7.145:80
138.97.60.140:8080
98.13.75.196:80
213.52.74.198:80
74.58.215.226:80
192.81.38.31:80
191.182.6.118:80
212.71.237.140:8080
209.236.123.42:8080
60.93.23.51:80
178.211.45.66:8080
190.24.243.186:80
62.84.75.50:80
50.121.220.50:80
137.74.106.111:7080
68.183.170.114:8080
70.32.115.157:8080
189.2.177.210:443
177.23.7.151:80
24.232.228.233:80
81.215.230.173:443
51.75.33.127:80
35.143.99.174:80
170.81.48.2:80
177.129.17.170:443
5.196.35.138:7080
51.255.165.160:8080
216.47.196.104:80
185.94.252.12:80
70.169.17.134:80
46.101.58.37:8080
192.241.143.52:8080
219.92.13.25:80
172.104.169.32:8080
152.169.22.67:80
77.238.212.227:80
104.131.41.185:8080
74.135.120.91:80
51.38.124.206:80
186.103.141.250:443
181.30.61.163:443
85.214.26.7:8080
190.190.219.184:80
37.187.161.206:8080
87.106.46.107:8080
12.162.84.2:8080
5.189.178.202:8080
83.169.21.32:7080
185.183.16.47:80
111.67.12.221:8080
68.183.190.199:8080
109.190.35.249:80
128.92.203.42:80
138.97.60.141:7080
1.226.84.243:8080
188.157.101.114:80
45.46.37.97:80
46.43.2.95:8080
70.32.84.74:8080
174.118.202.24:443
213.197.182.158:8080
149.202.72.142:7080
12.163.208.58:80
50.28.51.143:8080
82.76.111.249:443
177.144.130.105:8080
105.209.235.113:8080
94.176.234.118:443
45.33.77.42:8080
202.134.4.210:7080
177.73.0.98:443
181.129.96.162:8080
51.15.7.189:80
217.13.106.14:8080
178.250.54.208:8080
185.94.252.27:443
177.74.228.34:80
188.135.15.49:80
5.89.33.136:80
46.105.114.137:8080
190.115.18.139:8080
64.201.88.132:80
183.176.82.231:80
186.70.127.199:8090
177.144.130.105:443
191.191.23.135:80
201.213.177.139:80
Signatures
-
Emotet family
-
resource yara_rule behavioral29/memory/1868-4-0x00000000003E0000-0x00000000003FF000-memory.dmp emotet behavioral29/memory/1868-0-0x0000000000330000-0x0000000000350000-memory.dmp emotet behavioral29/memory/1868-8-0x0000000000280000-0x000000000029E000-memory.dmp emotet behavioral29/memory/2100-15-0x00000000003C0000-0x00000000003DF000-memory.dmp emotet behavioral29/memory/2100-11-0x00000000002A0000-0x00000000002C0000-memory.dmp emotet -
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral29/memory/1868-8-0x0000000000280000-0x000000000029E000-memory.dmp dave -
Executes dropped EXE 1 IoCs
pid Process 2100 azroles.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention\azroles.exe 7834499149add19c6c3507d0f2f31319.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language azroles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7834499149add19c6c3507d0f2f31319.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2100 azroles.exe 2100 azroles.exe 2100 azroles.exe 2100 azroles.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1868 7834499149add19c6c3507d0f2f31319.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1868 7834499149add19c6c3507d0f2f31319.exe 2100 azroles.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2100 1868 7834499149add19c6c3507d0f2f31319.exe 28 PID 1868 wrote to memory of 2100 1868 7834499149add19c6c3507d0f2f31319.exe 28 PID 1868 wrote to memory of 2100 1868 7834499149add19c6c3507d0f2f31319.exe 28 PID 1868 wrote to memory of 2100 1868 7834499149add19c6c3507d0f2f31319.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7834499149add19c6c3507d0f2f31319.exe"C:\Users\Admin\AppData\Local\Temp\7834499149add19c6c3507d0f2f31319.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention\azroles.exe"C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention\azroles.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD57834499149add19c6c3507d0f2f31319
SHA13f7eba783edef4988692355e4c7f617a34fa59d4
SHA256ea7191957590892433a40deb9421352a5dda21500e611eff8f810c71ebd2942a
SHA512740fecdd3c684f3199f4923d47d67db3188434591d8ece39a18ae65a160ce4f5d7fd3d8f88b29aff795e9312d95eb05da8391340cfd109b05d26d071c18e6f81