Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2025, 19:48 UTC

General

  • Target

    2025-01-12_4b158b27f34592651cf7e687455d9ad6_icedid.exe

  • Size

    408KB

  • MD5

    4b158b27f34592651cf7e687455d9ad6

  • SHA1

    be2a0ce6895280b2969564dbb9e27e2a2d3ba9b7

  • SHA256

    440bddc4e2106836fc51efe83fa4ef4e8824671475fcf9c0b0ad3ecf35d51647

  • SHA512

    90a07897be6feda7396f43e46ce326644cef451aac88de84baa420f75f9757081746c31b1758181a621e21c40bf978983b9766b3ba9c6d76368de4e673e5eb91

  • SSDEEP

    6144:HVtTsvH7NWW85J4KWB0Hex0rHnZGXXWg/13WfHofg1ELaeRlMJVBUwQhY6Nx:ji7NWWa4nMJzZhELb6+xR

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

200.109.58.183:443

190.195.148.163:80

46.105.131.68:8080

192.163.221.191:8080

124.150.175.133:80

190.96.118.15:443

216.70.88.55:8080

181.197.2.80:443

110.36.234.146:80

142.93.87.198:8080

23.253.207.142:8080

91.109.5.28:8080

138.197.140.163:8080

201.210.70.8:8080

94.177.253.126:80

75.154.163.1:8090

95.216.212.157:8080

186.84.173.153:80

157.7.164.178:8081

176.58.93.123:80

rsa_pubkey.plain
1
-----BEGIN PUBLIC KEY-----
2
MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAM426uN11n2LZDk/JiS93WIWG7fGCQmP
3
4h5yIJUxJwrjwtGVexCelD2WKrDw9sa/xKwmQKk3b2fUhwnHXjoSpR7pLaDo7pEc
4
iJB5y6hjbPyrSfL3Fxu74M2SAS0Arj3uAQIDAQAB
5
-----END PUBLIC KEY-----

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 48 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-12_4b158b27f34592651cf7e687455d9ad6_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-12_4b158b27f34592651cf7e687455d9ad6_icedid.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1944
      • C:\Users\Admin\AppData\Local\Temp\2025-01-12_4b158b27f34592651cf7e687455d9ad6_icedid.exe
        --c042fbd5
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: RenamesItself
        • Suspicious use of SetWindowsHookEx
        PID:4980
    • C:\Windows\SysWOW64\conmantrouble.exe
      "C:\Windows\SysWOW64\conmantrouble.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 16384
        2⤵
        • Modifies data under HKEY_USERS
        PID:872
      • C:\Windows\SysWOW64\conmantrouble.exe
        --32b63135
        2⤵
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3828

    Network

    • flag-us
      DNS
      58.55.71.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      58.55.71.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      134.130.81.91.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      134.130.81.91.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      76.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      76.32.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      209.205.72.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      209.205.72.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      53.210.109.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      53.210.109.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      198.187.3.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      198.187.3.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      98.117.19.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      98.117.19.2.in-addr.arpa
      IN PTR
      Response
      98.117.19.2.in-addr.arpa
      IN PTR
      a2-19-117-98deploystaticakamaitechnologiescom
    • 200.109.58.183:443
      conmantrouble.exe
      260 B
      5
    • 190.195.148.163:80
      conmantrouble.exe
      260 B
      5
    • 46.105.131.68:8080
      conmantrouble.exe
      260 B
      5
    • 192.163.221.191:8080
      conmantrouble.exe
      260 B
      200 B
      5
      5
    • 124.150.175.133:80
      conmantrouble.exe
      260 B
      5
    • 190.96.118.15:443
      conmantrouble.exe
      260 B
      120 B
      5
      3
    • 8.8.8.8:53
      58.55.71.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      58.55.71.13.in-addr.arpa

    • 8.8.8.8:53
      134.130.81.91.in-addr.arpa
      dns
      72 B
      147 B
      1
      1

      DNS Request

      134.130.81.91.in-addr.arpa

    • 8.8.8.8:53
      76.32.126.40.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      76.32.126.40.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      209.205.72.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      209.205.72.20.in-addr.arpa

    • 8.8.8.8:53
      53.210.109.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      53.210.109.20.in-addr.arpa

    • 8.8.8.8:53
      198.187.3.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      198.187.3.20.in-addr.arpa

    • 8.8.8.8:53
      98.117.19.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      98.117.19.2.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\da549a9f1af10173cb41d98b13dd6c1e_896de533-e5fb-4eb9-8f2b-d363f3584dc5

      Filesize

      50B

      MD5

      4356a877ee36bc8bd1a2d6f5727a52ac

      SHA1

      fa373f353496879e3e7d51cf2c2a963aa2681b4d

      SHA256

      e43deeec46a3039e8f06daeeb0f9ffd3dcc4bebd614093dbcdf44b6b6ad200c7

      SHA512

      eeb834061dfefd56b70c959750c12f34f6eea3da59b90c62c34a6e70999a1fd631c4b67505bf405e3139db6c2c1cd3402eab87ca3577658e308f61bee442dffb

    • memory/968-12-0x0000000000E80000-0x0000000000E97000-memory.dmp

      Filesize

      92KB

    • memory/3828-19-0x00000000016D0000-0x00000000016E7000-memory.dmp

      Filesize

      92KB

    • memory/4892-0-0x0000000002520000-0x0000000002537000-memory.dmp

      Filesize

      92KB

    • memory/4892-5-0x0000000002500000-0x0000000002511000-memory.dmp

      Filesize

      68KB

    • memory/4980-6-0x0000000002A40000-0x0000000002A57000-memory.dmp

      Filesize

      92KB

    • memory/4980-17-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.