| File name: | f36926cccab860a543bd540c621272a80cecb95ca960e9c80c1cc04284c5bd57 |
| Full analysis: | https://app.any.run/tasks/8be04d94-fc8d-42e8-ac79-ea0940256f5b |
| Verdict: | Malicious activity |
| Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
| Analysis date: | November 16, 2024, 21:10:48 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | C7767118690BBFC8938C11B7B71F8696 |
| SHA1: | 61720F9D4DB17146AD4B457C49BDCA55CAAED187 |
| SHA256: | F36926CCCAB860A543BD540C621272A80CECB95CA960E9C80C1CC04284C5BD57 |
| SSDEEP: | 24576:LDGkQ2YPQoK1f9AIN/1HN17I7aQBEzBpi/KnF/:LSkQ2YPEf9Ag/1HN17I7aQBEzBpi/Knd |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:10:27 18:09:28+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 242688 |
| InitializedDataSize: | 320000 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x21c38 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 5372 | "C:\Users\admin\Desktop\f36926cccab860a543bd540c621272a80cecb95ca960e9c80c1cc04284c5bd57.exe" | C:\Users\admin\Desktop\f36926cccab860a543bd540c621272a80cecb95ca960e9c80c1cc04284c5bd57.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 6752 | "C:\Users\admin\AppData\Local\KBDFI\acledit.exe" | C:\Users\admin\AppData\Local\KBDFI\acledit.exe | f36926cccab860a543bd540c621272a80cecb95ca960e9c80c1cc04284c5bd57.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| (PID) Process: | (6752) acledit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6752) acledit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (6752) acledit.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5372 | f36926cccab860a543bd540c621272a80cecb95ca960e9c80c1cc04284c5bd57.exe | C:\Users\admin\AppData\Local\KBDFI\acledit.exe | executable | |
MD5:C7767118690BBFC8938C11B7B71F8696 | SHA256:F36926CCCAB860A543BD540C621272A80CECB95CA960E9C80C1CC04284C5BD57 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6944 | svchost.exe | GET | 200 | 2.16.164.17:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.17:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5984 | RUXIMICS.exe | GET | 200 | 2.16.164.17:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5984 | RUXIMICS.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6752 | acledit.exe | POST | — | 179.15.102.2:80 | http://179.15.102.2/heAI3dnl/cS7anMWUPIf8m/nRqZL5M/A1m2h4TaLqkr/zLBZDz2eJ7EFpOD9uQJ/ | unknown | — | — | malicious |
6752 | acledit.exe | POST | — | 91.121.200.35:8080 | http://91.121.200.35:8080/iegQW2mFjQjOW5/P0ZL/gqFhx/0nbSH6qg9yeugS7p/Pg6NHJCVS7/ | unknown | — | — | unknown |
6752 | acledit.exe | POST | — | 78.90.78.210:80 | http://78.90.78.210/vHO9f2XQaF5p/DJhw2DE9Saa9/rdUG2K5XiyB5RJvd9mU/ | unknown | — | — | malicious |
6752 | acledit.exe | POST | — | 159.203.16.11:8080 | http://159.203.16.11:8080/EbctOJj8hgHQ7pk/AoR2QhLv/X7DxZ/myoB9sEHyw/ | unknown | — | — | unknown |
6752 | acledit.exe | POST | — | 188.226.165.170:8080 | http://188.226.165.170:8080/M3Xc/ | unknown | — | — | unknown |
6944 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6944 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5984 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5488 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.23.209.140:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6944 | svchost.exe | 2.16.164.17:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
5984 | RUXIMICS.exe | 2.16.164.17:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
5488 | MoUsoCoreWorker.exe | 2.16.164.17:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
6944 | svchost.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6752 | acledit.exe | A Network Trojan was detected | ET MALWARE Win32/Emotet CnC Activity (POST) M11 |
6752 | acledit.exe | A Network Trojan was detected | ET MALWARE Win32/Emotet CnC Activity (POST) M11 |
6752 | acledit.exe | A Network Trojan was detected | ET MALWARE Win32/Emotet CnC Activity (POST) M11 |
6752 | acledit.exe | A Network Trojan was detected | ET MALWARE Win32/Emotet CnC Activity (POST) M11 |
6752 | acledit.exe | A Network Trojan was detected | ET MALWARE Win32/Emotet CnC Activity (POST) M11 |