Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2025, 01:29

General

  • Target

    af06b10c86ecaf3a56649aaffa58cf37bc6a3dd6ea78a1fb1b550cf120d109a5.exe

  • Size

    424KB

  • MD5

    351505f8c93a1851e0de3a85ea7312de

  • SHA1

    546f12f6eeb1b7d57be75db3383a7055c1ed298e

  • SHA256

    af06b10c86ecaf3a56649aaffa58cf37bc6a3dd6ea78a1fb1b550cf120d109a5

  • SHA512

    07e6118d93c25314daeb7242bb3e762bd640c80c4f3366e2bce8b0f8cff80b6f1b148ced685aeebd6fdb33f0fbffdd0b2104207cab669f6240885c53a9250065

  • SSDEEP

    6144:+pkxaStbvBFscy65+Wf7AP5H08e7pV1oRUOeGbfUTpYDDmu/+3fb3:/jtbvM/hi7A6H1oRAG+pG/Y3

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

64.88.202.250:80

212.51.142.238:8080

200.55.243.138:8080

104.236.246.93:8080

61.19.246.238:443

79.45.112.220:80

95.213.236.64:8080

169.239.182.217:8080

103.86.49.11:8080

87.106.139.101:8080

74.208.45.104:8080

113.160.130.116:8443

209.141.54.221:8080

203.153.216.189:7080

73.11.153.178:8080

186.208.123.210:443

37.187.72.193:8080

201.173.217.124:443

121.124.124.40:7080

24.1.189.87:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af06b10c86ecaf3a56649aaffa58cf37bc6a3dd6ea78a1fb1b550cf120d109a5.exe
    "C:\Users\Admin\AppData\Local\Temp\af06b10c86ecaf3a56649aaffa58cf37bc6a3dd6ea78a1fb1b550cf120d109a5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\af06b10c86ecaf3a56649aaffa58cf37bc6a3dd6ea78a1fb1b550cf120d109a5mgr.exe
      C:\Users\Admin\AppData\Local\Temp\af06b10c86ecaf3a56649aaffa58cf37bc6a3dd6ea78a1fb1b550cf120d109a5mgr.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2472
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    609fe2f2626f934fc9135869cea003af

    SHA1

    b041099ec3dec8e3974a1ce6ded35222b49d13ed

    SHA256

    e1667233fd169f0cc01f380e8a0665b03c6326eb6197889f4ba00712324f2916

    SHA512

    eaac2f8f86aa7c17e0ffe6a360a3b3a7bbcb314ed62ff54bc4c478b197d23e82a66c6983dc25ae7231e10d1d6cee65bfd216c70639610938b713d2e8b7597f58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    630db38d1c535de9d9676176cc52301f

    SHA1

    df95d2f609aad9e2264132ebde04a93e70dc3de8

    SHA256

    003f46bc64487861e045e60220cd07b2cc74b2be92e6e1b1fdc94bc72493a279

    SHA512

    a8588eca140c67914741dc3d2ed3197ea36c52fb8bc48fe2827de0ba33fc276acaecda95009c190d2a5504b514d47199b19d3da2be59695db9484889ee6e1c87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01b30190e8c43f9179704908d1aea879

    SHA1

    938b1a85e4a7d0e8eaa8782014dbfd5356c5de19

    SHA256

    9a249f57b15d1149b77083d9e4d68a931aa2a09e7deddc99f704ae31e51292c7

    SHA512

    3587429ffaff7efe92adcf291b214f2f4533a1a2c2f6627af47e3582c5a047e339c38f54be1147678de6d6671f684f1fda03d3251c17c7160de2dfbd5cd42462

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16e2169387587dbb9695986f0c4b557b

    SHA1

    4bb50e2467b21bac45d4a7588c3c01fad54387bd

    SHA256

    fc7fc3bc32f4d74134cff384526b5fa3aa283cbe21901d0f536c6e6c05c67227

    SHA512

    390017f153d7a852f200c050a07a11695b30ab9c04d62c77becfb338506116a65b9c782913d29acfaea2650febe09e212283dd3477ace13d202a509599a5af2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    42324e0e742ce675507901f7012a3007

    SHA1

    2387e81bc4a42e9d7e21d42058db860933be7cf8

    SHA256

    a3d13b346bed2896eebf942b405f1e4c2edbb9b4c98b55fcf100853191a0d9a9

    SHA512

    4eb0190d0c795e54214fe55ae3cb5ff5af086e4ed234666e2d3884f8b2fa1de4d2d657adc64182c78074d6102b22285fb8aa36afbf64a9d43edf2a364d62ed9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a67b70b18fe08ba79cfb740e36edd035

    SHA1

    f957004a6bf87dbaab12477a2e6a94d9ff197279

    SHA256

    016b147eb1c66bd2ac8f80b616564279cf4fe3878f4778b668c82a1f9ba926bb

    SHA512

    72d299a98c3d2a6693ef7fefc18440a66740903fd8dbeb206b0946d2564ba4d3390780c0ea611ded70c9aed160d092c2ccaab15016f089bd8a394be5c50a7272

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09fe70f4281cc47c7d506f5f06585a9c

    SHA1

    9343ebc90ece116e63093db8446f77348e1e56ed

    SHA256

    2d4f111be97df41ebd7d8e67fa5641e969e2af37b8dda521815a13a8bde451a3

    SHA512

    9004350aa2b5fbcbf1b6aeaf2131e48120be22ba1c730ab8e146f8cc3f495c1bbc0c9fbbb03e94cd803dbd506406a562cd47e3a72eeb48794ea166ccd5573e8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47502ba5348c9633d72bb3912ce7bd9f

    SHA1

    7f3d5753270654ee683579ef67ba7900cc56aafd

    SHA256

    7056255007d09441ffee3bcecd79d9a4ee5468b74e7b982eef75d1146b2b4c6f

    SHA512

    8565c57d4f7135ec7320ae51b2a4cc2caf1248350d4fc6264fc9006265cf38f7032310cee0651da0b51caf7f78b0fb186ba472c2b984ccaa539c3d6d0646f24a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25e8822762463ae4e25febefe27f4511

    SHA1

    20a8b2b17e6e919383b651423a2ddb819678a5e1

    SHA256

    de59b561c3c24742c2a9c085651e5a27c4ff0e4242a6a1e685f57e818ca2aaf9

    SHA512

    dba1e26a147d76736065c7f946f0478275f9835e0c64de2b4799453b05b1b722f970388c23a9d912ebe12338604a9033f8273d16c12b1cdab6fff6b8446dd9d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7a9971880d7302b7a514d4ad8fef984

    SHA1

    f703dfc79e00a403feaf16e515f21374b488d23d

    SHA256

    6ff09cb135dd196b49035add28a743c19ee301bdad8588d84bf1dce4c34833c3

    SHA512

    fb0a7892c8a4a1d3291ef295ba16e10a1d48068223807233ffa22f04871ed01e826a6d6068363d6d05b4717e7554fef74cfe444f54210a800df35f11c71c2cb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    03cd8f92995ab8d13f491361c1d4d383

    SHA1

    59a5d1762f8bd2c32694af2e40b528d22bb376fd

    SHA256

    fe541c9ffd56bed3f74920c29b2a69c7189e264b1dccd3dbae12e12c96ae383a

    SHA512

    5014564dba50dbea59b6c722237de814f2be7bd562e35753a816b6c9ace52bc21bb20c60e21062ed301adce5c92f31761f69652027a3ebd5df9c03910e9b2661

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f6b041c25c696f568c8e6f34e3969be

    SHA1

    c0792215d6fa32c5a20af37fb8c6381e81ef0e5c

    SHA256

    6307ead0540266ec507ef6adc107b810882a8a41ea11be712c8932e1acdddd4d

    SHA512

    d6e246213d7fe77aed0ac45fbfef774429cbbb5c38ef99842ad4d1963ef44712122f2e02ab1c3439bd10beebe1d1f69c93b9f7abcd1c3fb50d6eb4d5d7c7042f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a0e7c8043ee208e6c54fdaa7d9ed9f4

    SHA1

    35807b7c2080612b6092ebce6a965363575ac1b6

    SHA256

    5e522d3f88419d7ef43f19f2c15d2e07b2f13a699276b68e45e12885408171d1

    SHA512

    a99a241cda74ffc4f2fc755784bcc2674ae558e8fa14449cb947bf015463e13e7e09e466d8a86e64c206b23ad2c856cecf0c4a08c954ac1e8f97feb7b11e4f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a6a20e7f078e7213af13d2b60224721

    SHA1

    6d8dce86081fb12ee907ac00e426dccfff185bc4

    SHA256

    89b421fd5c6dbb7156b8d1e1374876c422a6770852cac81e3b68902cc550ef50

    SHA512

    298deae6c03762850bb72f8d293f6eec64db2028244855911e39491ac60953f7a12eb8dd061da042d029d4940f0d31917dc90dc0b751be6201dcb1217cb079ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d8d418d7df584918bf8478d12ade2b6

    SHA1

    39bd6aa8ad56b2c1fbd30bd4dd8aeda7aae80ea3

    SHA256

    2a48436b8799c35841df2c099ef470ff0138aae3cd31529cf7345f8f6f2d25f1

    SHA512

    ac50f80bf6eba3ace368735f20862850ac46576b3dab2c93ed27cde1813eb60eb61b4d8bb832094f8ab9eff4115539c7c3cd5ccf7abb11a27a76a27ba4adc29f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da857bdac38c621c5b32836ebf38cd73

    SHA1

    b14f0ceac70237b66b2b1915afe885bb0821d56e

    SHA256

    70272f291edb5194276c1b0a81ba195a6d60d3d468c426b7f740f90a5ffc2117

    SHA512

    29491decc8ca4f22c117ff9e44e8fa285153aec9993aca002e379a9bb0c0b4020be0657973a77f60d7ec140ae7cc3b2fe2e1567edf00b3dcbe54f66be263a266

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2e3a41155bb9a28e053cca59059cbe4

    SHA1

    487124e24e60df8edd361500726739c08448bf0e

    SHA256

    dc52723ad01961a22f0312aa61c8ed2b34eb0f62fe69c5b15f75a43fdd6d27bc

    SHA512

    4042ca3b8de3b851898d7b22f6174c05bb5cafadabfeda44fc93ed31bf3b698990745356971d921a88fd674157be20e908a281a81ea6f4c219202cfd7e9e404d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04ef6c23e7ac9e44defd25b11417b7d1

    SHA1

    7a908ca19f3bce9a43bd3b4102ca098c892ae41f

    SHA256

    ef09a2edadbd4c8e66530c3b810b333aabf4062bbb1abd6564fda9ca7412febd

    SHA512

    ca74efa389b613b16df05cba58450cef4c2da01bc4e77e5709eaef23b31c0529d103d3c50909de46ef98ba3f187f42ce1f5eb380f4434a6d941fb0efbf188753

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed7f8cf52b3ba4401f54195e094ce1f5

    SHA1

    1e0eea69b76dd98bef0a5ea77f68ffd003f4702d

    SHA256

    2a0233b161d6b41bf9f92e25758516f4ff8be22f9992a1eef7377356fecd5c9c

    SHA512

    ce14f2c74159e0a2965bb0bda3b7f33db4ca06a1d4968a6b1fc67b582c28cbaf376ccc66efd6ac50301432e8a8eaf6f76ab2c64f6f97788cb5ad60532e487685

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fc41a1f29c3e10403ac98cf1b57c9f39

    SHA1

    421aeb0cdfac23d17a0d615b2966d699fc85dad9

    SHA256

    9b546296b069f6a567df58e08ad9acde8bd8f9b01265ebc39a9c10a550ce453a

    SHA512

    851ab05ed79ac9395852bf067c03c9160687d02aa3b1f28cf0e50451b96e3ed62a05b9ed3198fffe8fd70abd6d3d35a0525f9d33145eb772629232f08d28b9b1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7D543711-F573-11EF-8B74-7694D31B45CA}.dat

    Filesize

    3KB

    MD5

    aa3217b1866703135435e65633536a56

    SHA1

    4f48a6170f6ee0b4f9be1df5b4c7786611f6e382

    SHA256

    73b80fa48b20af678824036222e1b117bca948ddf6801684fa61ce1461f1975f

    SHA512

    0d84672feb6ffc9bef65c1c6d336924feb9e8723185338d439540da6cd8cbd3354086d82ef5a2d028e7ce246bf604af72728b3edfd67cfb1f60d8906217723c5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7D569871-F573-11EF-8B74-7694D31B45CA}.dat

    Filesize

    5KB

    MD5

    066edd4499ecc6b7dadc0f9b90e8f190

    SHA1

    7aa47532b64faec44c56217a0f702dc13cc4ba80

    SHA256

    74c28f586486c5b040ec1c4e749ea336355b7b73c036a521ca8c71f06912e039

    SHA512

    f07c0e350000415545ab85fb2faa23a652431dd8c62ab9085f466d15b09885313d6fb96c8514bbd6f77281873464d4c880331b15f06a0dc1daab123a45487be2

  • C:\Users\Admin\AppData\Local\Temp\Cab7C1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Cab89D.tmp

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\Local\Temp\Tar8B2.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • \Users\Admin\AppData\Local\Temp\af06b10c86ecaf3a56649aaffa58cf37bc6a3dd6ea78a1fb1b550cf120d109a5mgr.exe

    Filesize

    105KB

    MD5

    d5ca6e1f080abc64bbb11e098acbeabb

    SHA1

    1849634bf5a65e1baddddd4452c99dfa003e2647

    SHA256

    30193b5ccf8a1834eac3502ef165350ab74b107451145f3d2937fdf24b9eceae

    SHA512

    aa57ce51de38af6212d7339c4baac543a54b0f527621b0ef9e78eca5e5699e8508a154f54f8ac04135527d8417275eeee72a502a362547575699330cc756b161

  • memory/2656-13-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2656-16-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2656-30-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2656-24-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2656-12-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2656-11-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2656-14-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2656-15-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2736-25-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2736-29-0x0000000000220000-0x000000000027D000-memory.dmp

    Filesize

    372KB

  • memory/2736-8-0x0000000000220000-0x000000000027D000-memory.dmp

    Filesize

    372KB

  • memory/2736-0-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2736-21-0x0000000000310000-0x000000000031C000-memory.dmp

    Filesize

    48KB

  • memory/2736-9-0x0000000000220000-0x000000000027D000-memory.dmp

    Filesize

    372KB

  • memory/2736-18-0x0000000000300000-0x000000000030E000-memory.dmp

    Filesize

    56KB