Overview
overview
10Static
static
10New folder...la.exe
windows7-x64
4New folder...la.exe
windows10-2004-x64
4MaterialDe...rs.dll
windows7-x64
1MaterialDe...rs.dll
windows10-2004-x64
1MaterialDe...pf.dll
windows7-x64
1MaterialDe...pf.dll
windows10-2004-x64
1Microsoft....re.dll
windows7-x64
1Microsoft....re.dll
windows10-2004-x64
1SharpSteam.dll
windows7-x64
1SharpSteam.dll
windows10-2004-x64
1System.Man...on.dll
windows7-x64
1System.Man...on.dll
windows10-2004-x64
1UWPHook.exe
windows7-x64
3UWPHook.exe
windows10-2004-x64
3VDFParser.dll
windows7-x64
1VDFParser.dll
windows10-2004-x64
1New folder...c.meow
windows7-x64
3New folder...c.meow
windows10-2004-x64
3New folder...er.exe
windows7-x64
7New folder...er.exe
windows10-2004-x64
7New folder...ye.exe
windows7-x64
10New folder...ye.exe
windows10-2004-x64
10New folder/Mantas.exe
windows7-x64
6New folder/Mantas.exe
windows10-2004-x64
6New folder...re.exe
windows7-x64
1New folder...re.exe
windows10-2004-x64
1New folder...AT.exe
windows7-x64
10New folder...AT.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 03:16
Behavioral task
behavioral1
Sample
New folder/AgentTesla.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New folder/AgentTesla.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
MaterialDesignColors.dll
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
MaterialDesignColors.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
MaterialDesignThemes.Wpf.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
MaterialDesignThemes.Wpf.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Microsoft.Management.Infrastructure.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Microsoft.Management.Infrastructure.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
SharpSteam.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
SharpSteam.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
System.Management.Automation.dll
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
System.Management.Automation.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
UWPHook.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
UWPHook.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
VDFParser.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
VDFParser.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
New folder/Emotet.doc.meow
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
New folder/Emotet.doc.meow
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
New folder/FreeYoutubeDownloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
New folder/FreeYoutubeDownloader.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
New folder/HawkEye.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
New folder/HawkEye.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
New folder/Mantas.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
New folder/Mantas.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
New folder/Meoware.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
New folder/Meoware.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
New folder/RevengeRAT.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
New folder/RevengeRAT.exe
Resource
win10v2004-20250217-en
General
-
Target
New folder/Emotet.doc.meow
-
Size
139KB
-
MD5
b92021ca10aed3046fc3be5ac1c2a094
-
SHA1
0fb1ad5b53cdd09a7268c823ec796a6e623f086f
-
SHA256
c378387344e0a552dc065de6bfa607fd26e0b5c569751c79fbf9c6f2e91c9807
-
SHA512
bbeb5cfd7c5a890456b0805234a9ae325abc4a08dbad70b4ed1b3635dee4470a1f86869d5532809cecb595b9a89708f378921d733bd061aef693bfc5ee77ebb4
-
SSDEEP
3072:/Msknok2er/yR5DpQKajNDu1CkBwN0pqJfWSq:zkoRoKDpQZqQkmN0scR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2880 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 AcroRd32.exe 2880 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3008 3052 cmd.exe 31 PID 3052 wrote to memory of 3008 3052 cmd.exe 31 PID 3052 wrote to memory of 3008 3052 cmd.exe 31 PID 3008 wrote to memory of 2880 3008 rundll32.exe 32 PID 3008 wrote to memory of 2880 3008 rundll32.exe 32 PID 3008 wrote to memory of 2880 3008 rundll32.exe 32 PID 3008 wrote to memory of 2880 3008 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New folder\Emotet.doc.meow"1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\New folder\Emotet.doc.meow2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\New folder\Emotet.doc.meow"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD594c70afc300b502293d408c4514a7329
SHA1592f1266f70aeb8c5ddc285d4eea5aea528383d0
SHA2565e4e87f4b0adf2f9aca767aeef1674d306f52a04973658f6f1eb2f55b9135a25
SHA512b94e7af5b1ff2b56896e946551fb295879a9d20cb615363ba33d104309eded13601ab2db864440c665437da03e1a8e2dafe0cf62ef217d2683ad0070b452bb34