Edit tour
Windows
Analysis Report
ExeFile (233).exe
Overview
General Information
Detection
Emotet
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Emotet
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Uses known network protocols on non-standard ports
Connects to several IPs in different countries
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
- ExeFile (233).exe (PID: 3728 cmdline:
"C:\Users\ user\Deskt op\ExeFile (233).exe " MD5: 59287B19F7D85E749D19A57337103045) - dfscli.exe (PID: 3180 cmdline:
"C:\Window s\SysWOW64 \rtmpal\df scli.exe" MD5: 59287B19F7D85E749D19A57337103045) - mibincodec.exe (PID: 424 cmdline:
"C:\Window s\SysWOW64 \KBDTZM\mi bincodec.e xe" MD5: 59287B19F7D85E749D19A57337103045)
- svchost.exe (PID: 6600 cmdline:
C:\Windows \System32\ svchost.ex e -k Local Service -p -s Licens eManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Emotet | While Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021. |
{"RSA Public Key": "MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhANQOcBKvh5xEW7VcJ9totsjdBwuAclxS\nQ0e09fk8V053lktpW3TRrzAW63yt6j1KWnyxMrU3igFXypBoI4lVNmkje4UPtIIS\nfkzjEIvG1v/ZNn1k0J0PfFTxbFFeUEs3AwIDAQAB", "C2 list": ["88.153.35.32:80", "107.170.146.252:8080", "173.212.214.235:7080", "167.114.153.111:8080", "67.170.250.203:443", "121.124.124.40:7080", "103.86.49.11:8080", "74.214.230.200:80", "194.187.133.160:443", "172.104.97.173:8080", "172.91.208.86:80", "200.116.145.225:443", "202.134.4.216:8080", "172.105.13.66:443", "190.164.104.62:80", "50.35.17.13:80", "176.111.60.55:8080", "201.241.127.190:80", "66.76.12.94:8080", "95.213.236.64:8080", "194.4.58.192:7080", "62.171.142.179:8080", "79.137.83.50:443", "190.108.228.27:443", "120.150.218.241:443", "218.147.193.146:80", "176.113.52.6:443", "24.178.90.49:80", "123.176.25.234:80", "138.68.87.218:443", "194.190.67.75:80", "203.153.216.189:7080", "102.182.93.220:80", "37.139.21.175:8080", "50.91.114.38:80", "154.91.33.137:443", "97.82.79.83:80", "75.143.247.51:80", "71.15.245.148:8080", "89.121.205.18:80", "209.54.13.14:80", "47.36.140.164:80", "27.114.9.93:80", "104.131.11.150:443", "24.133.106.23:80", "49.50.209.131:80", "174.106.122.139:80", "2.58.16.89:8080", "157.245.99.39:8080", "137.59.187.107:8080", "220.245.198.194:80", "61.33.119.226:443", "62.75.141.82:80", "112.185.64.233:80", "61.19.246.238:443", "186.70.56.94:443", "37.187.72.193:8080", "190.240.194.77:443", "108.46.29.236:80", "118.83.154.64:443", "121.7.31.214:80", "216.139.123.119:80", "91.146.156.228:80", "119.59.116.21:8080", "89.216.122.92:80", "190.162.215.233:80", "87.106.136.232:8080", "68.115.186.26:80", "62.30.7.67:443", "37.179.204.33:80", "110.145.77.103:80", "78.24.219.147:8080", "185.94.252.104:443", "24.230.141.169:80", "49.3.224.99:8080", "104.131.123.136:443", "74.208.45.104:8080", "115.94.207.99:443", "41.185.28.84:8080", "139.99.158.11:443", "113.61.66.94:80", "67.163.161.107:80", "172.86.188.251:8080", "110.142.236.207:80", "120.150.60.189:80", "87.106.139.101:8080", "61.76.222.210:80", "93.147.212.206:80", "50.245.107.73:443", "85.105.111.166:80", "94.230.70.6:80", "134.209.144.106:443", "202.141.243.254:443", "94.23.237.171:443", "209.141.54.221:7080", "187.161.206.24:80", "76.175.162.101:80", "168.235.67.138:7080", "24.137.76.62:80", "95.9.5.93:80", "123.142.37.166:80", "72.186.136.247:443", "182.208.30.18:443", "186.74.215.34:80", "162.241.140.129:8080", "217.20.166.178:7080", "184.180.181.202:80", "217.123.207.149:80", "202.134.4.211:8080", "72.143.73.234:443", "59.125.219.109:443", "24.179.13.119:80", "5.39.91.110:7080", "109.74.5.95:8080", "46.105.131.79:8080", "91.211.88.52:7080", "94.200.114.161:80", "173.63.222.65:80", "139.162.60.124:8080", "188.219.31.12:80", "139.59.60.244:8080", "190.12.119.180:443", "78.188.106.53:443", "96.245.227.43:80"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Windows_Trojan_Emotet_5528b3b0 | unknown | unknown |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Windows_Trojan_Emotet_5528b3b0 | unknown | unknown |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Click to see the 13 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Windows_Trojan_Emotet_5528b3b0 | unknown | unknown |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Windows_Trojan_Emotet_5528b3b0 | unknown | unknown |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Click to see the 25 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: vburov: |
Timestamp: | 2024-08-20T19:11:56.438207+0200 |
SID: | 2035077 |
Severity: | 1 |
Source Port: | 49747 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 2024-08-20T19:09:53.067014+0200 |
SID: | 2035077 |
Severity: | 1 |
Source Port: | 49749 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 2024-08-20T19:11:31.533291+0200 |
SID: | 2035077 |
Severity: | 1 |
Source Port: | 49745 |
Destination Port: | 8080 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 2024-08-20T19:10:28.346788+0200 |
SID: | 2035077 |
Severity: | 1 |
Source Port: | 49730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 2024-08-20T19:10:55.327152+0200 |
SID: | 2035077 |
Severity: | 1 |
Source Port: | 49739 |
Destination Port: | 7080 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 2024-08-20T19:11:07.013000+0200 |
SID: | 2035077 |
Severity: | 1 |
Source Port: | 49742 |
Destination Port: | 7080 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 2024-08-20T19:10:52.310016+0200 |
SID: | 2035077 |
Severity: | 1 |
Source Port: | 49735 |
Destination Port: | 8080 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 2024-08-20T19:11:00.118321+0200 |
SID: | 2035077 |
Severity: | 1 |
Source Port: | 49740 |
Destination Port: | 8080 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |