Resubmissions

13/02/2025, 01:26 UTC

250213-btppra1pcz 10

17/01/2025, 20:14 UTC

250117-yz7h3s1qfw 10

17/01/2025, 20:12 UTC

250117-yy9l2sslcr 10

17/01/2025, 17:25 UTC

250117-vy9p9sxpez 10

17/01/2025, 17:21 UTC

250117-vw8eesyjfp 10

17/01/2025, 14:16 UTC

250117-rk9ass1rhk 10

17/01/2025, 14:12 UTC

250117-rhv1ds1lds 10

16/01/2025, 12:52 UTC

250116-p4et7a1mez 10

Analysis

  • max time kernel
    131s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/01/2025, 17:25 UTC

General

  • Target

    Malware-1-master/2530.exe

  • Size

    1.2MB

  • MD5

    568d17d6da77a46e35c8094a7c414375

  • SHA1

    500fa749471dad4ae40da6aa33fd6b2a53bcf200

  • SHA256

    0da56126ffb57acb5bb1a3ffa1c4c0c2605d257988b2d2964344b8f23173f615

  • SHA512

    7beb044f8bd366350b267c0fedc8466d2c5fd80b0f791f5697ce4577edced36b668401fd48df90b6c4ced05247d990c5e739e7232a2dcfc059dcc0c6a79d9427

  • SSDEEP

    12288:D+FwW6Se3oB/8WjH2fIGOVoDJLvfOqsUFY:D+qJSgZwEIGOVUJLnOqs+Y

Malware Config

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\2530.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\2530.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\2530.exe
      "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\2530.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      PID:3056
  • C:\Windows\SysWOW64\ifacenetsh.exe
    "C:\Windows\SysWOW64\ifacenetsh.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\ifacenetsh.exe
      "C:\Windows\SysWOW64\ifacenetsh.exe"
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:2196

Network

  • flag-us
    GET
    http://38.140.147.42/
    ifacenetsh.exe
    Remote address:
    38.140.147.42:80
    Request
    GET / HTTP/1.1
    Cookie: 21121=aUbosrlaKBXWhHQGgu1fez91VXKOJjHw8geL2SSXGy9Q0SANSut9sybFtuqawoq/X1ssNLTFrlZDTvAyl06gLSW8ieO0EFpy6JYA4u5me5cbvfO/aeUYHgK0RbhptVyrqEIn0rH9MqsWMeVeyJszQAi2/LCicTISpCgrc2HVAtOx36j+zOwuhnh51zZB03q5e3J/5hUlsKAIsNYgKro394ZzkgBe+TyJT3i2v+A3qgpY/DoIIVCpwZlELHD9PBU7iYyPFyOnfgr9vC74ggLJ81TZdpjbj0hneWjcfrPk2lRMTyL8DAAtF+bFjOMIsSaqXQ/Q9caUhN/cKn80nwg5B6vuuEcHCzdXASQadWEkBOi2r9LQvy6CUR+qtnElNV7pV7wWxg==
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: 38.140.147.42
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.0 200 OK
    Server: SonicWALL
    Expires: -1
    Cache-Control: no-cache
    Content-type: text/html; charset=UTF-8;
    X-Content-Type-Options: nosniff
    X-XSS-Protection: 1; mode=block
    X-Frame-Options: SAMEORIGIN
    Content-Security-Policy: default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: ws: wss: sonicwall.com *.sonicwall.com;
  • 75.112.62.42:80
    ifacenetsh.exe
    152 B
    3
  • 75.112.62.42:80
    ifacenetsh.exe
    152 B
    3
  • 107.13.144.134:80
    ifacenetsh.exe
    152 B
    3
  • 107.13.144.134:80
    ifacenetsh.exe
    152 B
    3
  • 38.140.147.42:80
    http://38.140.147.42/
    http
    ifacenetsh.exe
    1.1kB
    3.4kB
    9
    7

    HTTP Request

    GET http://38.140.147.42/

    HTTP Response

    200
  • 192.24.7.148:80
    ifacenetsh.exe
    152 B
    3
  • 192.24.7.148:80
    ifacenetsh.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1060-11-0x00000000002B0000-0x00000000002C0000-memory.dmp

    Filesize

    64KB

  • memory/1060-0-0x0000000000290000-0x00000000002A9000-memory.dmp

    Filesize

    100KB

  • memory/1060-10-0x0000000000270000-0x0000000000289000-memory.dmp

    Filesize

    100KB

  • memory/1060-4-0x0000000000290000-0x00000000002A9000-memory.dmp

    Filesize

    100KB

  • memory/2116-14-0x00000000003D0000-0x00000000003E9000-memory.dmp

    Filesize

    100KB

  • memory/2116-20-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/2116-28-0x00000000003B0000-0x00000000003C9000-memory.dmp

    Filesize

    100KB

  • memory/2116-18-0x00000000003D0000-0x00000000003E9000-memory.dmp

    Filesize

    100KB

  • memory/2116-19-0x00000000003B0000-0x00000000003C9000-memory.dmp

    Filesize

    100KB

  • memory/2196-21-0x00000000003C0000-0x00000000003D9000-memory.dmp

    Filesize

    100KB

  • memory/2196-27-0x00000000003E0000-0x00000000003F0000-memory.dmp

    Filesize

    64KB

  • memory/2196-25-0x00000000003C0000-0x00000000003D9000-memory.dmp

    Filesize

    100KB

  • memory/2196-26-0x00000000003A0000-0x00000000003B9000-memory.dmp

    Filesize

    100KB

  • memory/2196-31-0x00000000003A0000-0x00000000003B9000-memory.dmp

    Filesize

    100KB

  • memory/3056-5-0x0000000000300000-0x0000000000319000-memory.dmp

    Filesize

    100KB

  • memory/3056-13-0x0000000000320000-0x0000000000330000-memory.dmp

    Filesize

    64KB

  • memory/3056-12-0x00000000002E0000-0x00000000002F9000-memory.dmp

    Filesize

    100KB

  • memory/3056-9-0x0000000000300000-0x0000000000319000-memory.dmp

    Filesize

    100KB

  • memory/3056-30-0x00000000002E0000-0x00000000002F9000-memory.dmp

    Filesize

    100KB

  • memory/3056-29-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.