Overview
overview
10Static
static
10Malware-1-...30.exe
windows7-x64
10Malware-1-...30.exe
windows10-2004-x64
10Malware-1-...40.exe
windows7-x64
10Malware-1-...40.exe
windows10-2004-x64
10Malware-1-...32.exe
windows7-x64
10Malware-1-...32.exe
windows10-2004-x64
10Malware-1-.../5.exe
windows7-x64
10Malware-1-.../5.exe
windows10-2004-x64
10Malware-1-...91.exe
windows7-x64
10Malware-1-...91.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows7-x64
7Malware-1-...ey.exe
windows10-2004-x64
7Malware-1-...ad.exe
windows7-x64
3Malware-1-...ad.exe
windows10-2004-x64
3Malware-1-...ve.bat
windows7-x64
7Malware-1-...ve.bat
windows10-2004-x64
7Malware-1-...ve.exe
windows7-x64
6Malware-1-...ve.exe
windows10-2004-x64
7Malware-1-...ya.exe
windows7-x64
6Malware-1-...ya.exe
windows10-2004-x64
Malware-1-...re.exe
windows7-x64
10Malware-1-...re.exe
windows10-2004-x64
10Malware-1-...ry.exe
windows7-x64
10Malware-1-...ry.exe
windows10-2004-x64
10Malware-1-...ue.exe
windows7-x64
3Malware-1-...ue.exe
windows10-2004-x64
1Malware-1-...kt.bat
windows7-x64
7Malware-1-...kt.bat
windows10-2004-x64
Malware-1-...o3.exe
windows7-x64
Malware-1-...o3.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows7-x64
10Malware-1-...ey.exe
windows10-2004-x64
10Resubmissions
13/02/2025, 01:26 UTC
250213-btppra1pcz 1017/01/2025, 20:14 UTC
250117-yz7h3s1qfw 1017/01/2025, 20:12 UTC
250117-yy9l2sslcr 1017/01/2025, 17:25 UTC
250117-vy9p9sxpez 1017/01/2025, 17:21 UTC
250117-vw8eesyjfp 1017/01/2025, 14:16 UTC
250117-rk9ass1rhk 1017/01/2025, 14:12 UTC
250117-rhv1ds1lds 1016/01/2025, 12:52 UTC
250116-p4et7a1mez 10Analysis
-
max time kernel
565s -
max time network
571s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 14:16 UTC
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Malware-1-master/2530.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/2887140.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Malware-1-master/2887140.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/32.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Malware-1-master/32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Malware-1-master/5.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Malware-1-master/5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/96591.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Malware-1-master/96591.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/Amadey.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Malware-1-master/Amadey.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Malware-1-master/Download.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Malware-1-master/Download.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Malware-1-master/Petya.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Malware-1-master/Petya.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/Software.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Malware-1-master/Software.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/WannaCry.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Malware-1-master/WannaCry.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/eternalblue.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Malware-1-master/eternalblue.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/getr3kt.bat
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Malware-1-master/getr3kt.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/iimo3.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Malware-1-master/iimo3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/jey.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Malware-1-master/jey.exe
Resource
win10v2004-20241007-en
General
-
Target
Malware-1-master/2530.exe
-
Size
1.2MB
-
MD5
568d17d6da77a46e35c8094a7c414375
-
SHA1
500fa749471dad4ae40da6aa33fd6b2a53bcf200
-
SHA256
0da56126ffb57acb5bb1a3ffa1c4c0c2605d257988b2d2964344b8f23173f615
-
SHA512
7beb044f8bd366350b267c0fedc8466d2c5fd80b0f791f5697ce4577edced36b668401fd48df90b6c4ced05247d990c5e739e7232a2dcfc059dcc0c6a79d9427
-
SSDEEP
12288:D+FwW6Se3oB/8WjH2fIGOVoDJLvfOqsUFY:D+qJSgZwEIGOVUJLnOqs+Y
Malware Config
Signatures
-
Emotet family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language strshooter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language strshooter.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3572 2530.exe 3572 2530.exe 2652 2530.exe 2652 2530.exe 2448 strshooter.exe 2448 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe 4292 strshooter.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2652 2530.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3572 wrote to memory of 2652 3572 2530.exe 81 PID 3572 wrote to memory of 2652 3572 2530.exe 81 PID 3572 wrote to memory of 2652 3572 2530.exe 81 PID 2448 wrote to memory of 4292 2448 strshooter.exe 83 PID 2448 wrote to memory of 4292 2448 strshooter.exe 83 PID 2448 wrote to memory of 4292 2448 strshooter.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\2530.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\2530.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\2530.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\2530.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2652
-
-
C:\Windows\SysWOW64\strshooter.exe"C:\Windows\SysWOW64\strshooter.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\strshooter.exe"C:\Windows\SysWOW64\strshooter.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
Network
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request120.250.22.2.in-addr.arpaIN PTRResponse120.250.22.2.in-addr.arpaIN PTRa2-22-250-120deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request67.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request7.98.22.2.in-addr.arpaIN PTRResponse7.98.22.2.in-addr.arpaIN PTRa2-22-98-7deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request167.190.18.2.in-addr.arpaIN PTRResponse167.190.18.2.in-addr.arpaIN PTRa2-18-190-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request217.72.21.2.in-addr.arpaIN PTRResponse217.72.21.2.in-addr.arpaIN PTRa2-21-72-217deploystaticakamaitechnologiescom
-
Remote address:38.140.147.42:80RequestGET / HTTP/1.1
Cookie: 38714=LFPROHv/n6ryEoY7tJHzycOIUBNqdqM71qL7+QuV7+11X5NdIZww0eeMol5r35rHX0eld1b9ueFGj9/wCE5TaGLnmTdDV19avklJ9j0NZdpg1hQKrAxGCi2tgO/BsYHhNDZbYNXpeolL8C3TbBCNIH/BayVKUuHWqxii3FsxjvEZQrCj5z//VN/ivxR3SbJkhnUjRR53NYHcKShTGjgXqZrItLTaOPeiuQIh9KDinHIQFfHDNYb2i67k2DavWTSD1UIqRT7y53vT+VxbFV45dO2E0foGhhd8PxE31Tz+F1ehNgeB9Gl38/2p3pj7Qwfj7JFkghPAsUhw8j41vGV3uELHf+HtsuTWa0q0b1uyQaz5paXMI8JS9BQOrvXNQu/MkuZuV1Gkq3pc+sfbVs0AyecfAtVtKRclpwplEb/nOzCCYdlMQTXtJyjKbI6Hc8dhDWaga9RRtycvq65X7G2q8BnqFwV3ECUuT21fHYq41/GVsRXSHnvedRic9T7r6ThQ9VpzD4t+2i+v2w7R/jZBKm7kItQ=
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 38.140.147.42
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.0 200 OK
Expires: -1
Cache-Control: no-cache
Content-type: text/html; charset=UTF-8;
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Content-Security-Policy: default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: ws: wss: sonicwall.com *.sonicwall.com;
-
Remote address:8.8.8.8:53Request42.147.140.38.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request152.141.79.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:67.205.149.117:443RequestGET / HTTP/1.1
Cookie: 30832=Vu5l5qRpx4KxH2bTc79lo+5fhJB8aDnqHQNY6ZY8KyCqtlOaDFeAaMd6SPp6d/2gWLmrSXis81bs4LXTh++JNZ3M2Bw+wMj9+k3JIlw1W6bPnutFuQueh1qixgkNYpRB9YRYiDdYhY8Eup8+VVWoE14/49jJYLzBxW9YoYJuhJiq8heMsq9pXMrPbYCDk5FW1Kugsi4hOxsFQIrGjNboU8aHuxU8OXmdRlyjY6U5PwT0QYTZ+GmFpTVP8+sbcC6eZuMEZki9+hcnfevCbycTq4wLvrIQzNyMs2gGpEedIJ2saeqlR8fGI91eH+plKfJZeCoLGYT7tQhhimZMyGYlKKAdahE/3pHHrVkJ0p7EJyuQT+TGg247sjGXokmrSXYU9RKlN6gO7hUiAefcSKtGdtrjzz/o49uHPv6D723qvC0UFwm4UOFCsdZLqX3COYurFRWLDmRNkp6Ag3fx2OmePGyN4lva6/2O1lCh66Ln8EEiHwCWXPWZJniThGdsNOYWrVLZDw==
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 67.205.149.117:443
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 400 Bad Request
Date: Fri, 17 Jan 2025 14:25:45 GMT
Content-Type: text/html
Content-Length: 650
Connection: close
Strict-Transport-Security: max-age=604800; includeSubDomains
-
Remote address:8.8.8.8:53Request117.149.205.67.in-addr.arpaIN PTRResponse
-
260 B 5
-
260 B 5
-
1.3kB 3.4kB 10 7
HTTP Request
GET http://38.140.147.42/HTTP Response
200 -
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
1.1kB 1.1kB 6 5
HTTP Request
GET http://67.205.149.117:443/HTTP Response
400 -
260 B 200 B 5 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
156 B 3
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
120.250.22.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
67.31.126.40.in-addr.arpa
-
68 B 129 B 1 1
DNS Request
7.98.22.2.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
167.190.18.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
217.72.21.2.in-addr.arpa
-
72 B 130 B 1 1
DNS Request
42.147.140.38.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
21.236.111.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
152.141.79.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
73.31.126.40.in-addr.arpa
-
73 B 140 B 1 1
DNS Request
117.149.205.67.in-addr.arpa