Advertisement
paladin316

2288Emotet_e895b1432632b5f3900ba28d5d176377_5_2019-09-18_13_30.txt

Sep 18th, 2019
1,306
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.30 KB | None | 0 0
  1.  
  2. * ID: 2288
  3. * MalFamily: ""
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "Emotet_e895b1432632b5f3900ba28d5d176377.5"
  8. * File Size: 413696
  9. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  10. * SHA256: "6bbc1fc04607dc91b4bc52faafb15b3c5a51778bc59487684d3dfa64a1c85a71"
  11. * MD5: "e895b1432632b5f3900ba28d5d176377"
  12. * SHA1: "6cbfecfa88875b829a48ac33ed08557b3d0219e3"
  13. * SHA512: "b0b83680bd588f5d15f09861a8d40006c6e718cce25b0f8eeac2db407a0f0edb7c4d5d142e5bbfa123adde3652e23a802c05adc040a3ee6459c118b5d7335b9b"
  14. * CRC32: "F6741077"
  15. * SSDEEP: "6144:yGqCzZ+I7NhNEMxrE6CC0x1/hkVTIX8XrA7PI0TOwUhYtEJxKIRYzV:7qSJLEcrrJqvXAA7PIruyxrRYzV"
  16.  
  17. * Process Execution:
  18. "fEWPFx.exe",
  19. "fEWPFx.exe",
  20. "fEWPFx.exe",
  21. "fEWPFx.exe",
  22. "explorer.exe",
  23. "services.exe",
  24. "historymachine.exe",
  25. "historymachine.exe",
  26. "historymachine.exe",
  27. "historymachine.exe",
  28. "svchost.exe",
  29. "WerFault.exe",
  30. "WmiApSrv.exe",
  31. "svchost.exe",
  32. "WmiPrvSE.exe",
  33. "mscorsvw.exe"
  34.  
  35.  
  36. * Executed Commands:
  37. "\"C:\\Users\\user\\AppData\\Local\\Temp\\fEWPFx.exe\"",
  38. "C:\\Users\\user\\AppData\\Local\\Temp\\fEWPFx.exe --e1138505",
  39. "\"C:\\Windows\\SysWOW64\\historymachine.exe\"",
  40. "C:\\Windows\\System32\\svchost.exe -k WerSvcGroup",
  41. "C:\\Windows\\system32\\wbem\\WmiApSrv.exe",
  42. "C:\\Windows\\system32\\svchost.exe -k netsvcs",
  43. "C:\\Windows\\SysWOW64\\historymachine.exe --81d93c85",
  44. "C:\\Windows\\system32\\WerFault.exe -u -p 2044 -s 4032"
  45.  
  46.  
  47. * Signatures Detected:
  48.  
  49. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  50. "Details":
  51.  
  52.  
  53. "Description": "Behavioural detection: Executable code extraction",
  54. "Details":
  55.  
  56.  
  57. "Description": "At least one process apparently crashed during execution",
  58. "Details":
  59.  
  60.  
  61. "Description": "Communicates with IPs located across a large number of unique countries",
  62. "Details":
  63.  
  64. "country": "United Kingdom"
  65.  
  66.  
  67. "country": "France"
  68.  
  69.  
  70. "country": "Iran, Islamic Republic of"
  71.  
  72.  
  73. "country": "Germany"
  74.  
  75.  
  76. "country": "Bangladesh"
  77.  
  78.  
  79. "country": "Argentina"
  80.  
  81.  
  82. "country": "United States"
  83.  
  84.  
  85. "country": "Singapore"
  86.  
  87.  
  88. "country": "Ecuador"
  89.  
  90.  
  91. "country": "Azerbaijan"
  92.  
  93.  
  94. "country": "Canada"
  95.  
  96.  
  97. "country": "India"
  98.  
  99.  
  100.  
  101.  
  102. "Description": "Creates RWX memory",
  103. "Details":
  104.  
  105.  
  106. "Description": "Possible date expiration check, exits too soon after checking local time",
  107. "Details":
  108.  
  109. "process": "historymachine.exe, PID 2820"
  110.  
  111.  
  112.  
  113.  
  114. "Description": "Mimics the system's user agent string for its own requests",
  115. "Details":
  116.  
  117.  
  118. "Description": "Guard pages use detected - possible anti-debugging.",
  119. "Details":
  120.  
  121.  
  122. "Description": "Performs HTTP requests potentially not found in PCAP.",
  123. "Details":
  124.  
  125. "url_ioc": "87.106.136.232:8080/rtm/"
  126.  
  127.  
  128. "url_ioc": "59.152.93.46:443/jit/arizona/forced/merge/"
  129.  
  130.  
  131. "url_ioc": "186.4.172.5:443/bml/usbccid/forced/"
  132.  
  133.  
  134. "url_ioc": "198.199.88.162:8080/scripts/between/"
  135.  
  136.  
  137. "url_ioc": "178.62.37.188:443/usbccid/img/forced/"
  138.  
  139.  
  140. "url_ioc": "142.44.162.209:8080/attrib/"
  141.  
  142.  
  143. "url_ioc": "185.129.92.210:7080/results/"
  144.  
  145.  
  146. "url_ioc": "91.92.191.134:8080/vermont/balloon/pdf/"
  147.  
  148.  
  149. "url_ioc": "92.222.125.16:7080/img/attrib/"
  150.  
  151.  
  152. "url_ioc": "188.166.253.46:8080/attrib/xian/forced/"
  153.  
  154.  
  155. "url_ioc": "178.254.6.27:7080/scripts/"
  156.  
  157.  
  158.  
  159.  
  160. "Description": "Expresses interest in specific running processes",
  161. "Details":
  162.  
  163. "process": "WerFault.exe"
  164.  
  165.  
  166.  
  167.  
  168. "Description": "Repeatedly searches for a not-found process, may want to run with startbrowser=1 option",
  169. "Details":
  170.  
  171.  
  172. "Description": "A process created a hidden window",
  173. "Details":
  174.  
  175. "Process": "fEWPFx.exe -> C:\\Users\\user\\AppData\\Local\\Temp\\fEWPFx.exe"
  176.  
  177.  
  178. "Process": "fEWPFx.exe -> C:\\Users\\user\\AppData\\Local\\Temp\\fEWPFx.exe"
  179.  
  180.  
  181. "Process": "historymachine.exe -> C:\\Windows\\SysWOW64\\historymachine.exe"
  182.  
  183.  
  184. "Process": "historymachine.exe -> C:\\Windows\\SysWOW64\\historymachine.exe"
  185.  
  186.  
  187.  
  188.  
  189. "Description": "Drops a binary and executes it",
  190. "Details":
  191.  
  192. "binary": "C:\\Windows\\SysWOW64\\historymachine.exe"
  193.  
  194.  
  195.  
  196.  
  197. "Description": "Multiple direct IP connections",
  198. "Details":
  199.  
  200. "direct_ip_connections": "Made direct connections to 14 unique IP addresses"
  201.  
  202.  
  203.  
  204.  
  205. "Description": "The binary likely contains encrypted or compressed data.",
  206. "Details":
  207.  
  208. "section": "name: .rsrc, entropy: 7.17, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ, raw_size: 0x0001d000, virtual_size: 0x0001ccfc"
  209.  
  210.  
  211.  
  212.  
  213. "Description": "Deletes its original binary from disk",
  214. "Details":
  215.  
  216.  
  217. "Description": "Attempts to remove evidence of file being downloaded from the Internet",
  218. "Details":
  219.  
  220. "file": "C:\\Windows\\SysWOW64\\historymachine.exe:Zone.Identifier"
  221.  
  222.  
  223.  
  224.  
  225. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  226. "Details":
  227.  
  228. "Spam": "services.exe (500) called API GetSystemTimeAsFileTime 9867663 times"
  229.  
  230.  
  231.  
  232.  
  233. "Description": "Installs itself for autorun at Windows startup",
  234. "Details":
  235.  
  236. "service name": "historymachine"
  237.  
  238.  
  239. "service path": "\"C:\\Windows\\SysWOW64\\historymachine.exe\""
  240.  
  241.  
  242.  
  243.  
  244. "Description": "File has been identified by 12 Antiviruses on VirusTotal as malicious",
  245. "Details":
  246.  
  247. "Invincea": "heuristic"
  248.  
  249.  
  250. "APEX": "Malicious"
  251.  
  252.  
  253. "Kaspersky": "UDS:DangerousObject.Multi.Generic"
  254.  
  255.  
  256. "Paloalto": "generic.ml"
  257.  
  258.  
  259. "Emsisoft": "Trojan.Agent (A)"
  260.  
  261.  
  262. "Microsoft": "Trojan:Win32/Trickbot.GN"
  263.  
  264.  
  265. "ZoneAlarm": "UDS:DangerousObject.Multi.Generic"
  266.  
  267.  
  268. "ESET-NOD32": "a variant of Win32/Kryptik.GWNL"
  269.  
  270.  
  271. "Tencent": "Win32.Trojan.Inject.Auto"
  272.  
  273.  
  274. "Webroot": "W32.Trojan.Emotet"
  275.  
  276.  
  277. "AVG": "FileRepMalware"
  278.  
  279.  
  280. "CrowdStrike": "win/malicious_confidence_60% (D)"
  281.  
  282.  
  283.  
  284.  
  285. "Description": "Creates a copy of itself",
  286. "Details":
  287.  
  288. "copy": "C:\\Windows\\SysWOW64\\historymachine.exe"
  289.  
  290.  
  291.  
  292.  
  293. "Description": "Created network traffic indicative of malicious activity",
  294. "Details":
  295.  
  296. "signature": "ET CNC Feodo Tracker Reported CnC Server group 3"
  297.  
  298.  
  299. "signature": "ET CNC Feodo Tracker Reported CnC Server group 2"
  300.  
  301.  
  302. "signature": "ET CNC Feodo Tracker Reported CnC Server group 5"
  303.  
  304.  
  305. "signature": "ET CNC Feodo Tracker Reported CnC Server group 10"
  306.  
  307.  
  308. "signature": "ET CNC Feodo Tracker Reported CnC Server group 15"
  309.  
  310.  
  311. "signature": "ET CNC Feodo Tracker Reported CnC Server group 16"
  312.  
  313.  
  314. "signature": "ET CNC Feodo Tracker Reported CnC Server group 24"
  315.  
  316.  
  317.  
  318.  
  319.  
  320. * Started Service:
  321. "historymachine",
  322. "WerSvc",
  323. "wmiApSrv"
  324.  
  325.  
  326. * Mutexes:
  327. "Global\\IC1C5B64F",
  328. "Global\\MC1C5B64F",
  329. "Local\\WERReportingForProcess2044",
  330. "Global\\\\xe5\\x88\\x90\\xcc\\xbe",
  331. "IESQMMUTEX_0_208",
  332. "Global\\RefreshRA_Mutex_Lib",
  333. "Global\\RefreshRA_Mutex",
  334. "Global\\RefreshRA_Mutex_Flag",
  335. "Global\\WmiApSrv"
  336.  
  337.  
  338. * Modified Files:
  339. "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-0000000000-0000000000-0000000000-1000\\00000000-0000-0000-0000-000000000000b_00000000-0000-0000-0000-000000000000",
  340. "C:\\Windows\\SysWOW64\\historymachine.exe",
  341. "C:\\ProgramData\\Microsoft\\Crypto\\RSA\\S-1-5-18\\6d14e4b1d8ca773bab785d1be032546e_00000000-0000-0000-0000-000000000000",
  342. "\\??\\WMIDataDevice",
  343. "\\??\\PIPE\\samr",
  344. "C:\\Windows\\sysnative\\wbem\\repository\\WRITABLE.TST",
  345. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING1.MAP",
  346. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING2.MAP",
  347. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING3.MAP",
  348. "C:\\Windows\\sysnative\\wbem\\repository\\OBJECTS.DATA",
  349. "C:\\Windows\\sysnative\\wbem\\repository\\INDEX.BTR",
  350. "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2WMI SELF-INSTRUMENTATION EVENT PROVIDER",
  351. "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM"
  352.  
  353.  
  354. * Deleted Files:
  355. "C:\\Windows\\SysWOW64\\khmerflows.exe",
  356. "C:\\Users\\user\\AppData\\Local\\Temp\\fEWPFx.exe",
  357. "C:\\Windows\\SysWOW64\\historymachine.exe:Zone.Identifier"
  358.  
  359.  
  360. * Modified Registry Keys:
  361. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\WerSvc\\Type",
  362. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\wmiApSrv\\Type",
  363. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Type",
  364. "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Debug",
  365. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\Windows Error Reporting\\Debug\\ExceptionRecord",
  366. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Debug\\UIHandles",
  367. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Debug\\UIHandles\\RestartDialog",
  368. "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Debug\\UIHandles",
  369. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\Windows Error Reporting\\Debug\\UIHandles\\RestartDialog",
  370. "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections\\DefaultConnectionSettings",
  371. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\PROVIDERS\\Performance\\Performance Refreshed",
  372. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ProcessID",
  373. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ThrottleDrege",
  374. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Parameters\\ServiceDllUnloadOnStop",
  375. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\LastServiceStart",
  376. "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Wbem\\Transports\\Decoupled\\Server",
  377. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\CreationTime",
  378. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\MarshaledProxy",
  379. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\ProcessIdentifier",
  380. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ConfigValueEssNeedsLoading",
  381. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\List of event-active namespaces",
  382. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\ESS\\//./root/CIMV2\\SCM Event Provider"
  383.  
  384.  
  385. * Deleted Registry Keys:
  386.  
  387. * DNS Communications:
  388.  
  389. * Domains:
  390.  
  391. * Network Communication - ICMP:
  392.  
  393. * Network Communication - HTTP:
  394.  
  395. * Network Communication - SMTP:
  396.  
  397. * Network Communication - Hosts:
  398.  
  399. "country_name": "United Kingdom",
  400. "ip": "95.128.43.213",
  401. "inaddrarpa": "",
  402. "hostname": ""
  403.  
  404.  
  405. "country_name": "France",
  406. "ip": "92.222.125.16",
  407. "inaddrarpa": "",
  408. "hostname": ""
  409.  
  410.  
  411. "country_name": "Iran, Islamic Republic of",
  412. "ip": "91.92.191.134",
  413. "inaddrarpa": "",
  414. "hostname": ""
  415.  
  416.  
  417. "country_name": "Germany",
  418. "ip": "87.106.136.232",
  419. "inaddrarpa": "",
  420. "hostname": ""
  421.  
  422.  
  423. "country_name": "Bangladesh",
  424. "ip": "59.152.93.46",
  425. "inaddrarpa": "",
  426. "hostname": ""
  427.  
  428.  
  429. "country_name": "Argentina",
  430. "ip": "201.212.57.109",
  431. "inaddrarpa": "",
  432. "hostname": ""
  433.  
  434.  
  435. "country_name": "United States",
  436. "ip": "198.199.88.162",
  437. "inaddrarpa": "",
  438. "hostname": ""
  439.  
  440.  
  441. "country_name": "Singapore",
  442. "ip": "188.166.253.46",
  443. "inaddrarpa": "",
  444. "hostname": ""
  445.  
  446.  
  447. "country_name": "Ecuador",
  448. "ip": "186.4.172.5",
  449. "inaddrarpa": "",
  450. "hostname": ""
  451.  
  452.  
  453. "country_name": "Azerbaijan",
  454. "ip": "185.129.92.210",
  455. "inaddrarpa": "",
  456. "hostname": ""
  457.  
  458.  
  459. "country_name": "United Kingdom",
  460. "ip": "178.62.37.188",
  461. "inaddrarpa": "",
  462. "hostname": ""
  463.  
  464.  
  465. "country_name": "Germany",
  466. "ip": "178.254.6.27",
  467. "inaddrarpa": "",
  468. "hostname": ""
  469.  
  470.  
  471. "country_name": "Canada",
  472. "ip": "142.44.162.209",
  473. "inaddrarpa": "",
  474. "hostname": ""
  475.  
  476.  
  477. "country_name": "India",
  478. "ip": "117.197.124.36",
  479. "inaddrarpa": "",
  480. "hostname": ""
  481.  
  482.  
  483.  
  484. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement