Loading ...

Play interactive tourEdit tour

Analysis Report zeD11Fztx8

Overview

General Information

Sample Name:zeD11Fztx8 (renamed file extension from none to exe)
Analysis ID:384980
MD5:ecbc4b40dcfec4ed1b2647b217da0441
SHA1:e08eb07c69d8fc8e75927597767288a21d6ed7f6
SHA256:878d5137e0c9a072c83c596b4e80f2aa52a8580ef214e5ba0d59daa5036a92f8
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Emotet
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

Startup

  • System is w10x64
  • zeD11Fztx8.exe (PID: 6720 cmdline: 'C:\Users\user\Desktop\zeD11Fztx8.exe' MD5: ECBC4B40DCFEC4ED1B2647B217DA0441)
    • zeD11Fztx8.exe (PID: 6728 cmdline: C:\Users\user\Desktop\zeD11Fztx8.exe MD5: ECBC4B40DCFEC4ED1B2647B217DA0441)
  • storageservice.exe (PID: 6812 cmdline: C:\Windows\SysWOW64\storageservice.exe MD5: ECBC4B40DCFEC4ED1B2647B217DA0441)
    • storageservice.exe (PID: 6828 cmdline: C:\Windows\SysWOW64\storageservice.exe MD5: ECBC4B40DCFEC4ED1B2647B217DA0441)
  • svchost.exe (PID: 4800 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5688 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6352 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
zeD11Fztx8.exeJoeSecurity_EmotetYara detected EmotetJoe Security
    zeD11Fztx8.exeEmotetEmotet Payloadkevoreilly
    • 0x16f0:$snippet1: FF 15 F8 C1 40 00 83 C4 0C 68 40 00 00 F0 6A 18
    • 0x1732:$snippet2: 6A 13 68 01 00 01 00 FF 15 C4 C0 40 00 85 C0

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000001.00000002.640361081.0000000001381000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000000.00000002.633596595.0000000001381000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        00000002.00000000.638984509.0000000001381000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
          00000001.00000000.633157257.0000000001381000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
            00000003.00000000.639793428.0000000001381000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
              Click to see the 3 entries

              Unpacked PEs

              SourceRuleDescriptionAuthorStrings
              3.2.storageservice.exe.1380000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                3.2.storageservice.exe.1380000.0.unpackEmotetEmotet Payloadkevoreilly
                • 0x16f0:$snippet1: FF 15 F8 C1 38 01 83 C4 0C 68 40 00 00 F0 6A 18
                • 0x1732:$snippet2: 6A 13 68 01 00 01 00 FF 15 C4 C0 38 01 85 C0
                1.2.zeD11Fztx8.exe.1380000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                  1.2.zeD11Fztx8.exe.1380000.0.unpackEmotetEmotet Payloadkevoreilly
                  • 0x16f0:$snippet1: FF 15 F8 C1 38 01 83 C4 0C 68 40 00 00 F0 6A 18
                  • 0x1732:$snippet2: 6A 13 68 01 00 01 00 FF 15 C4 C0 38 01 85 C0
                  3.0.storageservice.exe.1380000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                    Click to see the 11 entries

                    Sigma Overview

                    No Sigma rule has matched

                    Signature Overview

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection:

                    barindex
                    Antivirus / Scanner detection for submitted sampleShow sources
                    Source: zeD11Fztx8.exeAvira: detected
                    Multi AV Scanner detection for domain / URLShow sources
                    Source: http://173.230.145.224:8080/Virustotal: Detection: 6%Perma Link
                    Multi AV Scanner detection for submitted fileShow sources
                    Source: zeD11Fztx8.exeVirustotal: Detection: 82%Perma Link
                    Source: zeD11Fztx8.exeReversingLabs: Detection: 96%
                    Machine Learning detection for sampleShow sources
                    Source: zeD11Fztx8.exeJoe Sandbox ML: detected
                    Source: zeD11Fztx8.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: zeD11Fztx8.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: global trafficTCP traffic: 192.168.2.4:49746 -> 193.169.54.12:8080
                    Source: global trafficTCP traffic: 192.168.2.4:49757 -> 173.230.145.224:8080
                    Source: global trafficTCP traffic: 192.168.2.4:49763 -> 80.86.91.232:7080
                    Source: Joe Sandbox ViewIP Address: 193.169.54.12 193.169.54.12
                    Source: Joe Sandbox ViewIP Address: 193.169.54.12 193.169.54.12
                    Source: Joe Sandbox ViewIP Address: 80.86.91.232 80.86.91.232
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 79.172.249.82:443Content-Length: 468Connection: Keep-AliveCache-Control: no-cacheData Raw: 77 ee 51 67 a8 c2 dc 38 20 bc 12 53 17 05 a1 e7 44 fa 23 2e b7 b8 71 13 ca 5f 34 cb 7d 0c be 09 5f d9 5a 5d 85 11 56 95 de d3 de 12 62 eb a8 08 e0 25 70 14 f1 93 c1 00 4a d5 23 a5 0e 77 2e d9 75 a6 89 1b 16 5a c1 dd 31 ce 32 df 13 a0 62 81 87 92 a5 75 31 ed 00 f4 09 08 7f ae 0e 3e f8 65 d0 b5 42 c2 d2 95 50 fe 33 48 54 55 da 3f 44 b3 df eb cb 47 92 31 e0 5c 2c 4d 46 89 f3 f7 e8 28 63 c8 8b 2d 43 6c f6 74 39 33 7f 21 86 82 16 e9 af 01 09 96 57 45 d8 63 20 47 a2 c1 62 3c 2d 74 bb 9d 73 46 51 ff 00 e2 16 99 bd 8a 96 75 c0 cc 9b 6b c8 76 2f 7d 1f 55 df 13 a3 4e 79 3d 0a 7d c1 09 f3 25 b0 1a 81 32 06 db 60 eb aa f9 77 7f 4f d5 65 00 d6 0f 40 ae d6 80 7d 6d d3 ee 85 09 f6 22 03 2f 33 e5 8b 34 8b db c6 73 67 06 01 9b 17 0a 4e 5b 3c f2 f3 aa 73 a9 cd 5f 3c 34 db da c3 54 41 f5 ea 56 26 df 67 5a 61 72 63 60 16 79 a7 db e1 af f6 2f 66 31 e2 88 4f 2d b7 94 7e cd ce 96 27 93 d4 79 59 88 98 23 46 23 99 b4 91 75 8e c1 dc 3b dd db f3 c3 0e 36 95 96 a2 94 42 6d b3 f7 b1 24 01 e7 71 a7 5e 9b 36 26 b2 96 3c 92 d8 90 7f db 79 c4 c3 fa 4e 68 ad ba 03 e9 19 9e d0 8a 2c 33 fb bd b2 75 f0 06 1f 2a 3f 5d 5b 6a 5d b5 14 d0 23 dd 58 78 93 f6 34 14 5e 10 ba 25 6e 54 d1 9d e9 4b b7 80 6f 7e 87 f1 04 26 22 80 65 b6 e1 bb f9 5c a2 ed 76 32 ff 84 0b d3 07 45 59 19 31 0c fe 79 50 52 83 bd d4 f3 e6 d7 cc e7 56 eb b7 23 59 81 8c 16 9c 72 74 e3 4a 61 67 88 c4 db bf 46 0d 23 37 4c 63 74 58 1e 57 77 32 e6 ef 17 cd 09 Data Ascii: wQg8 SD#.q_4}_Z]Vb%pJ#w.uZ12bu1>eBP3HTU?DG1\,MF(c-Clt93!WEc Gb<-tsFQukv/}UNy=}%2`wOe@}m"/34sgN[<s_<4TAV&gZarc`y/f1O-~'yY#F#u;6Bm$q^6&<yNh,3u*?][j]#Xx4^%nTKo~&"e\v2EY1yPRV#YrtJagF#7LctXWw2
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.169.54.12
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.169.54.12
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.169.54.12
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.230.145.224
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.230.145.224
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.230.145.224
                    Source: unknownTCP traffic detected without corresponding DNS query: 80.86.91.232
                    Source: unknownTCP traffic detected without corresponding DNS query: 80.86.91.232
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 79.172.249.82:443Content-Length: 468Connection: Keep-AliveCache-Control: no-cacheData Raw: 77 ee 51 67 a8 c2 dc 38 20 bc 12 53 17 05 a1 e7 44 fa 23 2e b7 b8 71 13 ca 5f 34 cb 7d 0c be 09 5f d9 5a 5d 85 11 56 95 de d3 de 12 62 eb a8 08 e0 25 70 14 f1 93 c1 00 4a d5 23 a5 0e 77 2e d9 75 a6 89 1b 16 5a c1 dd 31 ce 32 df 13 a0 62 81 87 92 a5 75 31 ed 00 f4 09 08 7f ae 0e 3e f8 65 d0 b5 42 c2 d2 95 50 fe 33 48 54 55 da 3f 44 b3 df eb cb 47 92 31 e0 5c 2c 4d 46 89 f3 f7 e8 28 63 c8 8b 2d 43 6c f6 74 39 33 7f 21 86 82 16 e9 af 01 09 96 57 45 d8 63 20 47 a2 c1 62 3c 2d 74 bb 9d 73 46 51 ff 00 e2 16 99 bd 8a 96 75 c0 cc 9b 6b c8 76 2f 7d 1f 55 df 13 a3 4e 79 3d 0a 7d c1 09 f3 25 b0 1a 81 32 06 db 60 eb aa f9 77 7f 4f d5 65 00 d6 0f 40 ae d6 80 7d 6d d3 ee 85 09 f6 22 03 2f 33 e5 8b 34 8b db c6 73 67 06 01 9b 17 0a 4e 5b 3c f2 f3 aa 73 a9 cd 5f 3c 34 db da c3 54 41 f5 ea 56 26 df 67 5a 61 72 63 60 16 79 a7 db e1 af f6 2f 66 31 e2 88 4f 2d b7 94 7e cd ce 96 27 93 d4 79 59 88 98 23 46 23 99 b4 91 75 8e c1 dc 3b dd db f3 c3 0e 36 95 96 a2 94 42 6d b3 f7 b1 24 01 e7 71 a7 5e 9b 36 26 b2 96 3c 92 d8 90 7f db 79 c4 c3 fa 4e 68 ad ba 03 e9 19 9e d0 8a 2c 33 fb bd b2 75 f0 06 1f 2a 3f 5d 5b 6a 5d b5 14 d0 23 dd 58 78 93 f6 34 14 5e 10 ba 25 6e 54 d1 9d e9 4b b7 80 6f 7e 87 f1 04 26 22 80 65 b6 e1 bb f9 5c a2 ed 76 32 ff 84 0b d3 07 45 59 19 31 0c fe 79 50 52 83 bd d4 f3 e6 d7 cc e7 56 eb b7 23 59 81 8c 16 9c 72 74 e3 4a 61 67 88 c4 db bf 46 0d 23 37 4c 63 74 58 1e 57 77 32 e6 ef 17 cd 09 Data Ascii: wQg8 SD#.q_4}_Z]Vb%pJ#w.uZ12bu1>eBP3HTU?DG1\,MF(c-Clt93!WEc Gb<-tsFQukv/}UNy=}%2`wOe@}m"/34sgN[<s_<4TAV&gZarc`y/f1O-~'yY#F#u;6Bm$q^6&<yNh,3u*?][j]#Xx4^%nTKo~&"e\v2EY1yPRV#YrtJagF#7LctXWw2
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://173.230.145.224:8080/
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://173.230.145.224:8080/gP
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://173.230.145.224:8080/m
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://193.169.54.12:8080/
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://193.169.54.12:8080//
                    Source: storageservice.exe, 00000003.00000002.898800934.0000000001048000.00000004.00000020.sdmpString found in binary or memory: http://79.172.249.82:443/
                    Source: storageservice.exe, 00000003.00000002.898800934.0000000001048000.00000004.00000020.sdmpString found in binary or memory: http://79.172.249.82:443/$
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://80.86.91.232:7080/
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://80.86.91.232:7080/24
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://80.86.91.232:7080/7
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://80.86.91.232:7080/9.54.12:8080/;
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://80.86.91.232:7080/G
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://80.86.91.232:7080/ed
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpString found in binary or memory: http://80.86.91.232:7080/h
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                    Source: zeD11Fztx8.exe, 00000000.00000002.633588654.0000000000C8A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    E-Banking Fraud:

                    barindex
                    Yara detected EmotetShow sources
                    Source: Yara matchFile source: zeD11Fztx8.exe, type: SAMPLE
                    Source: Yara matchFile source: 00000001.00000002.640361081.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.633596595.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.638984509.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.633157257.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.639793428.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.898946523.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.632271273.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.640209506.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 3.2.storageservice.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.storageservice.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.storageservice.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.storageservice.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPE

                    System Summary:

                    barindex
                    Malicious sample detected (through community Yara rule)Show sources
                    Source: zeD11Fztx8.exe, type: SAMPLEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 3.2.storageservice.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 1.2.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 3.0.storageservice.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 2.2.storageservice.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 0.0.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 1.0.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 2.0.storageservice.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 0.2.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: C:\Windows\SysWOW64\storageservice.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeFile deleted: C:\Windows\SysWOW64\storageservice.exe:Zone.IdentifierJump to behavior
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeCode function: 0_2_01386E70
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeCode function: 0_2_013877F0
                    Source: zeD11Fztx8.exe, 00000001.00000002.641022607.0000000003780000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs zeD11Fztx8.exe
                    Source: zeD11Fztx8.exe, 00000001.00000002.641157550.0000000003870000.00000002.00000001.sdmpBinary or memory string: originalfilename vs zeD11Fztx8.exe
                    Source: zeD11Fztx8.exe, 00000001.00000002.641157550.0000000003870000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs zeD11Fztx8.exe
                    Source: zeD11Fztx8.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: zeD11Fztx8.exe, type: SAMPLEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 3.2.storageservice.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 1.2.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 3.0.storageservice.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 2.2.storageservice.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 0.0.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 1.0.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 2.0.storageservice.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 0.2.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: classification engineClassification label: mal96.troj.evad.winEXE@9/0@0/4
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeCode function: 0_2_01382110 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeMutant created: \Sessions\1\BaseNamedObjects\Global\I7AD90449
                    Source: C:\Windows\SysWOW64\storageservice.exeMutant created: \BaseNamedObjects\Global\I7AD90449
                    Source: C:\Windows\SysWOW64\storageservice.exeMutant created: \BaseNamedObjects\M7B1EF2AC
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeMutant created: \Sessions\1\BaseNamedObjects\Global\M7AD90449
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeMutant created: \Sessions\1\BaseNamedObjects\MAA169F89
                    Source: zeD11Fztx8.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: zeD11Fztx8.exeVirustotal: Detection: 82%
                    Source: zeD11Fztx8.exeReversingLabs: Detection: 96%
                    Source: unknownProcess created: C:\Users\user\Desktop\zeD11Fztx8.exe 'C:\Users\user\Desktop\zeD11Fztx8.exe'
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeProcess created: C:\Users\user\Desktop\zeD11Fztx8.exe C:\Users\user\Desktop\zeD11Fztx8.exe
                    Source: unknownProcess created: C:\Windows\SysWOW64\storageservice.exe C:\Windows\SysWOW64\storageservice.exe
                    Source: C:\Windows\SysWOW64\storageservice.exeProcess created: C:\Windows\SysWOW64\storageservice.exe C:\Windows\SysWOW64\storageservice.exe
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeProcess created: C:\Users\user\Desktop\zeD11Fztx8.exe C:\Users\user\Desktop\zeD11Fztx8.exe
                    Source: C:\Windows\SysWOW64\storageservice.exeProcess created: C:\Windows\SysWOW64\storageservice.exe C:\Windows\SysWOW64\storageservice.exe
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                    Source: zeD11Fztx8.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeCode function: 0_2_01381F40 VirtualAlloc,memcpy,memcpy,LoadLibraryA,GetProcAddress,VirtualFree,

                    Persistence and Installation Behavior:

                    barindex
                    Drops executables to the windows directory (C:\Windows) and starts themShow sources
                    Source: C:\Windows\SysWOW64\storageservice.exeExecutable created and started: C:\Windows\SysWOW64\storageservice.exe
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exePE file moved: C:\Windows\SysWOW64\storageservice.exeJump to behavior

                    Hooking and other Techniques for Hiding and Protection:

                    barindex
                    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeFile opened: C:\Windows\SysWOW64\storageservice.exe:Zone.Identifier read attributes | delete

                    Malware Analysis System Evasion:

                    barindex
                    Found evasive API chain (may stop execution after checking mutex)Show sources
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeAPI coverage: 6.5 %
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeFile Volume queried: C:\ FullSizeInformation
                    Source: svchost.exe, 0000000D.00000002.841710504.000001EEB86B0000.00000002.00000001.sdmp, svchost.exe, 00000013.00000002.880141754.000002BBEBD40000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                    Source: storageservice.exe, 00000003.00000003.827346434.0000000001096000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                    Source: svchost.exe, 0000000D.00000002.841710504.000001EEB86B0000.00000002.00000001.sdmp, svchost.exe, 00000013.00000002.880141754.000002BBEBD40000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                    Source: svchost.exe, 0000000D.00000002.841710504.000001EEB86B0000.00000002.00000001.sdmp, svchost.exe, 00000013.00000002.880141754.000002BBEBD40000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                    Source: storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW(N
                    Source: svchost.exe, 0000000D.00000002.841710504.000001EEB86B0000.00000002.00000001.sdmp, svchost.exe, 00000013.00000002.880141754.000002BBEBD40000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                    Source: C:\Windows\SysWOW64\storageservice.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeCode function: 0_2_01381F40 VirtualAlloc,memcpy,memcpy,LoadLibraryA,GetProcAddress,VirtualFree,
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeCode function: 0_2_01381BE0 mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeCode function: 0_2_013815B0 GetModuleFileNameW,_snwprintf,GetProcessHeap,HeapFree,_snwprintf,GetProcessHeap,HeapFree,CreateEventW,CreateMutexW,CloseHandle,GetLastError,SetEvent,CloseHandle,CloseHandle,memset,CreateProcessW,WaitForSingleObject,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\storageservice.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\user\Desktop\zeD11Fztx8.exeCode function: 0_2_01388D50 RtlGetVersion,GetNativeSystemInfo,
                    Source: C:\Windows\SysWOW64\storageservice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information:

                    barindex
                    Yara detected EmotetShow sources
                    Source: Yara matchFile source: zeD11Fztx8.exe, type: SAMPLE
                    Source: Yara matchFile source: 00000001.00000002.640361081.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.633596595.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.638984509.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.633157257.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.639793428.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.898946523.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.632271273.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.640209506.0000000001381000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 3.2.storageservice.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.storageservice.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.storageservice.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.storageservice.exe.1380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zeD11Fztx8.exe.1380000.0.unpack, type: UNPACKEDPE

                    Mitre Att&ck Matrix

                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid AccountsNative API11Path InterceptionProcess Injection1Masquerading12Input Capture1Security Software Discovery21Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Hidden Files and Directories1NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsSystem Information Discovery14SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

                    Behavior Graph

                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    Screenshots

                    Thumbnails

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                    windows-stand

                    Antivirus, Machine Learning and Genetic Malware Detection

                    Initial Sample

                    SourceDetectionScannerLabelLink
                    zeD11Fztx8.exe83%VirustotalBrowse
                    zeD11Fztx8.exe97%ReversingLabsWin32.Trojan.Emotet
                    zeD11Fztx8.exe100%AviraTR/Crypt.XPACK.Gen
                    zeD11Fztx8.exe100%Joe Sandbox ML

                    Dropped Files

                    No Antivirus matches

                    Unpacked PE Files

                    SourceDetectionScannerLabelLinkDownload
                    2.0.storageservice.exe.1380000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    3.2.storageservice.exe.1380000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.0.zeD11Fztx8.exe.1380000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.zeD11Fztx8.exe.1380000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    3.0.storageservice.exe.1380000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.2.zeD11Fztx8.exe.1380000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    2.2.storageservice.exe.1380000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.zeD11Fztx8.exe.1380000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                    Domains

                    No Antivirus matches

                    URLs

                    SourceDetectionScannerLabelLink
                    http://173.230.145.224:8080/6%VirustotalBrowse
                    http://173.230.145.224:8080/0%Avira URL Cloudsafe
                    http://173.230.145.224:8080/gP0%Avira URL Cloudsafe
                    http://80.86.91.232:7080/6%VirustotalBrowse
                    http://80.86.91.232:7080/0%Avira URL Cloudsafe
                    http://80.86.91.232:7080/h0%Avira URL Cloudsafe
                    http://80.86.91.232:7080/G0%Avira URL Cloudsafe
                    https://79.172.249.82:443/0%Avira URL Cloudsafe
                    http://193.169.54.12:8080/0%Avira URL Cloudsafe
                    http://79.172.249.82:443/$0%Avira URL Cloudsafe
                    http://80.86.91.232:7080/240%Avira URL Cloudsafe
                    http://80.86.91.232:7080/ed0%Avira URL Cloudsafe
                    http://80.86.91.232:7080/70%Avira URL Cloudsafe
                    http://79.172.249.82:443/0%Avira URL Cloudsafe
                    http://80.86.91.232:7080/9.54.12:8080/;0%Avira URL Cloudsafe
                    http://173.230.145.224:8080/m0%Avira URL Cloudsafe
                    http://193.169.54.12:8080//0%Avira URL Cloudsafe

                    Domains and IPs

                    Contacted Domains

                    No contacted domains info

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    https://79.172.249.82:443/false
                    • Avira URL Cloud: safe
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://173.230.145.224:8080/storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmptrue
                    • 6%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://173.230.145.224:8080/gPstorageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmptrue
                    • Avira URL Cloud: safe
                    unknown
                    http://80.86.91.232:7080/storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpfalse
                    • 6%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://80.86.91.232:7080/hstorageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://80.86.91.232:7080/Gstorageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://193.169.54.12:8080/storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://79.172.249.82:443/$storageservice.exe, 00000003.00000002.898800934.0000000001048000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://80.86.91.232:7080/24storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://80.86.91.232:7080/edstorageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://80.86.91.232:7080/7storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://79.172.249.82:443/storageservice.exe, 00000003.00000002.898800934.0000000001048000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://80.86.91.232:7080/9.54.12:8080/;storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://173.230.145.224:8080/mstorageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmptrue
                    • Avira URL Cloud: safe
                    unknown
                    http://193.169.54.12:8080//storageservice.exe, 00000003.00000002.898823671.000000000105A000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    193.169.54.12
                    unknownGermany
                    49464ICFSYSTEMSDEfalse
                    80.86.91.232
                    unknownGermany
                    8972GD-EMEA-DC-SXB1DEfalse
                    173.230.145.224
                    unknownUnited States
                    63949LINODE-APLinodeLLCUSfalse
                    79.172.249.82
                    unknownHungary
                    43711SZERVERNET-HU-ASHUfalse

                    General Information

                    Joe Sandbox Version:31.0.0 Emerald
                    Analysis ID:384980
                    Start date:10.04.2021
                    Start time:18:47:04
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 5m 46s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:zeD11Fztx8 (renamed file extension from none to exe)
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:22
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal96.troj.evad.winEXE@9/0@0/4
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 42.7% (good quality ratio 39%)
                    • Quality average: 79%
                    • Quality standard deviation: 30.4%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.

                    Simulations

                    Behavior and APIs

                    No simulations

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    193.169.54.12_01_.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    hEHN0WzBF.exeGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    Outstanding Invoices.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    Outstanding Invoices.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    http://baseballpontedipiave.com/Sales-Invoice/Get hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    emotet2.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    20180212-20_46_01_.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    http://www.yourhabitchangecoach.co.uk/wp-content/Overdue-payment/Get hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    SalesInvoice.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    SalesInvoice.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    mj03dyvx_2076767.exeGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    Scan1782384.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    Scan1782384.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    RDuYHvb2jQ.exeGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    Outstanding Invoices.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    Outstanding Invoices.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    http://okomekai.symphonic-net.com/Invoice-69070770/Get hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    Outstanding invoice.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    Outstanding invoice.docGet hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    mail.rodolfogvalencia.com/Invoice/Get hashmaliciousBrowse
                    • 193.169.54.12:8080/
                    80.86.91.232Invoice.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Overdue payment.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Emotet.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Outstanding Invoices.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Outstanding Invoices.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Emote.exeGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Question.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    emotet.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Paypal.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Paypal.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    emotet.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    emotet.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    960-27-621120-257 & 960-27-621120-969.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Rechnung.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    Open invoices.docGet hashmaliciousBrowse
                    • 80.86.91.232:4143/
                    20180212-20_46_01_.docGet hashmaliciousBrowse
                    • 80.86.91.232:7080/
                    SalesInvoice.docGet hashmaliciousBrowse
                    • 80.86.91.232:7080/
                    SalesInvoice.docGet hashmaliciousBrowse
                    • 80.86.91.232:7080/
                    mj03dyvx_2076767.exeGet hashmaliciousBrowse
                    • 80.86.91.232:7080/
                    Scan1782384.docGet hashmaliciousBrowse
                    • 80.86.91.232:7080/

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    GD-EMEA-DC-SXB1DETRS-11-0221-020.exeGet hashmaliciousBrowse
                    • 85.25.177.199
                    Payment Advice.exeGet hashmaliciousBrowse
                    • 85.25.177.199
                    VMtEguRH.exeGet hashmaliciousBrowse
                    • 85.25.177.199
                    Reports-018315.xlsmGet hashmaliciousBrowse
                    • 185.21.102.197
                    Reports-018315.xlsmGet hashmaliciousBrowse
                    • 185.21.102.197
                    D12547698.VBSGet hashmaliciousBrowse
                    • 85.25.93.141
                    sample.exe.exeGet hashmaliciousBrowse
                    • 80.86.91.232
                    5zc9vbGBo3.exeGet hashmaliciousBrowse
                    • 217.172.179.54
                    InnAcjnAmG.exeGet hashmaliciousBrowse
                    • 217.172.179.54
                    yxghUyIGb4.exeGet hashmaliciousBrowse
                    • 80.86.91.232
                    TaTYytHaBk.exeGet hashmaliciousBrowse
                    • 85.25.43.31
                    8X93Tzvd7V.exeGet hashmaliciousBrowse
                    • 217.172.179.54
                    u8A8Qy5S7O.exeGet hashmaliciousBrowse
                    • 217.172.179.54
                    SecuriteInfo.com.Mal.GandCrypt-A.24654.exeGet hashmaliciousBrowse
                    • 217.172.179.54
                    SecuriteInfo.com.Mal.GandCrypt-A.5674.exeGet hashmaliciousBrowse
                    • 217.172.179.54
                    csrss.bin.exeGet hashmaliciousBrowse
                    • 188.138.33.233
                    yx8DBT3r5r.exeGet hashmaliciousBrowse
                    • 92.51.129.66
                    E00636067E.exeGet hashmaliciousBrowse
                    • 85.25.177.199
                    http___contributeindustry.com_js_engine-rawbin.exeGet hashmaliciousBrowse
                    • 85.25.177.199
                    z2xQEFs54b.exeGet hashmaliciousBrowse
                    • 87.230.93.218
                    ICFSYSTEMSDE9fdUNaHzLv.exeGet hashmaliciousBrowse
                    • 193.169.54.12
                    sample.exe.exeGet hashmaliciousBrowse
                    • 193.169.54.12
                    yxghUyIGb4.exeGet hashmaliciousBrowse
                    • 193.169.54.12
                    0HvIGwMmBV.exeGet hashmaliciousBrowse
                    • 193.169.54.12
                    pitEBNziGR.exeGet hashmaliciousBrowse
                    • 193.169.54.12
                    _01_.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    hEHN0WzBF.exeGet hashmaliciousBrowse
                    • 193.169.54.12
                    Outstanding Invoices.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    Outstanding Invoices.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    http://baseballpontedipiave.com/Sales-Invoice/Get hashmaliciousBrowse
                    • 193.169.54.12
                    emotet2.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    20180212-20_46_01_.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    http://www.yourhabitchangecoach.co.uk/wp-content/Overdue-payment/Get hashmaliciousBrowse
                    • 193.169.54.12
                    SalesInvoice.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    SalesInvoice.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    mj03dyvx_2076767.exeGet hashmaliciousBrowse
                    • 193.169.54.12
                    Scan1782384.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    Scan1782384.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    RDuYHvb2jQ.exeGet hashmaliciousBrowse
                    • 193.169.54.12
                    Outstanding Invoices.docGet hashmaliciousBrowse
                    • 193.169.54.12
                    LINODE-APLinodeLLCUSCNTR-NO-GLDU7267089.xlsxGet hashmaliciousBrowse
                    • 45.56.127.45
                    gunzipped.exeGet hashmaliciousBrowse
                    • 45.56.119.148
                    frox0cheats.exeGet hashmaliciousBrowse
                    • 176.58.123.25
                    nDHV6wKWHF.exeGet hashmaliciousBrowse
                    • 172.104.164.58
                    OfficeConsultPlugin.exeGet hashmaliciousBrowse
                    • 109.237.24.104
                    RFQ#798606.exeGet hashmaliciousBrowse
                    • 45.56.119.148
                    Private doc.docmGet hashmaliciousBrowse
                    • 109.237.24.104
                    lK8vF3n2e7.exeGet hashmaliciousBrowse
                    • 172.104.233.225
                    newordermx.exeGet hashmaliciousBrowse
                    • 45.33.2.79
                    sample.exeGet hashmaliciousBrowse
                    • 66.228.32.51
                    BnJvVt951o.exeGet hashmaliciousBrowse
                    • 45.33.54.74
                    BnJvVt951o.exeGet hashmaliciousBrowse
                    • 45.33.54.74
                    SMtbg7yHyR.exeGet hashmaliciousBrowse
                    • 45.33.54.74
                    9fdUNaHzLv.exeGet hashmaliciousBrowse
                    • 173.230.145.224
                    Private doc.docmGet hashmaliciousBrowse
                    • 212.71.251.238
                    invoice_document.docmGet hashmaliciousBrowse
                    • 212.71.251.238
                    sample.exe.exeGet hashmaliciousBrowse
                    • 173.230.145.224
                    Document_Opener.exe.14.exeGet hashmaliciousBrowse
                    • 88.80.186.210
                    Audio playback (7656) for joew Camrosa.htmGet hashmaliciousBrowse
                    • 192.81.132.201
                    Paymonth invoice.exeGet hashmaliciousBrowse
                    • 45.79.19.196

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    No created / dropped files found

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.436116781781946
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:zeD11Fztx8.exe
                    File size:45568
                    MD5:ecbc4b40dcfec4ed1b2647b217da0441
                    SHA1:e08eb07c69d8fc8e75927597767288a21d6ed7f6
                    SHA256:878d5137e0c9a072c83c596b4e80f2aa52a8580ef214e5ba0d59daa5036a92f8
                    SHA512:3ec4de3f35e10c874916a6402004e3b9fc60b5a026d20100ede992b592fe396db2bee0b225ab5f2fb85561f687a8abf0c9e7c8b3cf0344c384c80297278be7b5
                    SSDEEP:768:uhBY2Tumxi0mv/LWT3uBoGMUslwORSSrUBqvWzNQRC1s:ABxT6jW7uBgyOvWS
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........R..h...h...h.......h...i...h.......h.......h.Rich..h.................PE..L...7.]Z..........................................@

                    File Icon

                    Icon Hash:00828e8e8686b000

                    Static PE Info

                    General

                    Entrypoint:0x409ee0
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                    DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x5A5DA737 [Tue Jan 16 07:18:15 2018 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:4cfe8bbfb0ca5b84bbad08b043ea0c87

                    Entrypoint Preview

                    Instruction
                    push esi
                    push 0040C1F0h
                    push 3966646Ch
                    push 00000009h
                    mov ecx, D22E2014h
                    call 00007F2560F1290Eh
                    mov edx, 004011F0h
                    mov ecx, eax
                    call 00007F2560F12832h
                    add esp, 0Ch
                    mov ecx, 8F7EE672h
                    push 0040C0D0h
                    push 6677A1D2h
                    push 00000048h
                    call 00007F2560F128E9h
                    mov edx, 004010D0h
                    mov ecx, eax
                    call 00007F2560F1280Dh
                    add esp, 0Ch
                    push 08000000h
                    push 00000000h
                    call dword ptr [0040C1A8h]
                    push eax
                    call dword ptr [0040C10Ch]
                    mov esi, eax
                    test esi, esi
                    je 00007F2560F1AC48h
                    push 08000000h
                    push 00000000h
                    push esi
                    call dword ptr [0040C1F8h]
                    add esp, 0Ch
                    push esi
                    push 00000000h
                    call dword ptr [0040C1A8h]
                    push eax
                    call dword ptr [0040C1E8h]
                    call 00007F2560F1226Ah
                    push 00000000h
                    call dword ptr [0040C1ACh]
                    pop esi
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push ebp
                    mov ebp, esp
                    sub esp, 0Ch
                    push ebx
                    push esi
                    push edi
                    mov edi, edx
                    mov dword ptr [ebp-0Ch], ecx
                    mov esi, 00000001h
                    mov dword ptr [ebp-08h], esi
                    mov eax, dword ptr [edi]
                    cmp eax, 7Fh
                    jbe 00007F2560F1AC31h
                    lea ecx, dword ptr [ecx+00h]
                    shr eax, 07h
                    inc esi
                    cmp eax, 7Fh

                    Rich Headers

                    Programming Language:
                    • [LNK] VS2013 UPD4 build 31101
                    • [IMP] VS2008 SP1 build 30729

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xbad00x28.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd0000x5cc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0xb0000x8.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x98830x9a00False0.503297483766data6.45508103349IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rdata0xb0000xb2e0xc00False0.160807291667data4.23495809712IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xc0000xbd80x200False0.123046875data0.91267432928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                    .reloc0xd0000x5cc0x600False0.8671875data6.49434732961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                    Imports

                    DLLImport
                    KERNEL32.dllWTSGetActiveConsoleSessionId

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 10, 2021 18:47:54.465001106 CEST49738443192.168.2.479.172.249.82
                    Apr 10, 2021 18:47:54.500535011 CEST4434973879.172.249.82192.168.2.4
                    Apr 10, 2021 18:47:54.500761032 CEST49738443192.168.2.479.172.249.82
                    Apr 10, 2021 18:47:54.501919985 CEST49738443192.168.2.479.172.249.82
                    Apr 10, 2021 18:47:54.537208080 CEST4434973879.172.249.82192.168.2.4
                    Apr 10, 2021 18:47:54.537532091 CEST4434973879.172.249.82192.168.2.4
                    Apr 10, 2021 18:47:54.537558079 CEST4434973879.172.249.82192.168.2.4
                    Apr 10, 2021 18:47:54.537693977 CEST49738443192.168.2.479.172.249.82
                    Apr 10, 2021 18:47:54.537740946 CEST49738443192.168.2.479.172.249.82
                    Apr 10, 2021 18:47:54.537854910 CEST49738443192.168.2.479.172.249.82
                    Apr 10, 2021 18:47:54.573343992 CEST4434973879.172.249.82192.168.2.4
                    Apr 10, 2021 18:48:24.935547113 CEST497468080192.168.2.4193.169.54.12
                    Apr 10, 2021 18:48:27.960725069 CEST497468080192.168.2.4193.169.54.12
                    Apr 10, 2021 18:48:33.976751089 CEST497468080192.168.2.4193.169.54.12
                    Apr 10, 2021 18:49:17.192873955 CEST497578080192.168.2.4173.230.145.224
                    Apr 10, 2021 18:49:17.364305019 CEST808049757173.230.145.224192.168.2.4
                    Apr 10, 2021 18:49:17.870801926 CEST497578080192.168.2.4173.230.145.224
                    Apr 10, 2021 18:49:18.042294979 CEST808049757173.230.145.224192.168.2.4
                    Apr 10, 2021 18:49:18.542711973 CEST497578080192.168.2.4173.230.145.224
                    Apr 10, 2021 18:49:18.714617968 CEST808049757173.230.145.224192.168.2.4
                    Apr 10, 2021 18:49:48.950465918 CEST497637080192.168.2.480.86.91.232
                    Apr 10, 2021 18:49:51.951813936 CEST497637080192.168.2.480.86.91.232

                    HTTP Request Dependency Graph

                    • 79.172.249.82:443

                    HTTP Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.44973879.172.249.82443C:\Windows\SysWOW64\storageservice.exe
                    TimestampkBytes transferredDirectionData
                    Apr 10, 2021 18:47:54.501919985 CEST284OUTPOST / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                    Host: 79.172.249.82:443
                    Content-Length: 468
                    Connection: Keep-Alive
                    Cache-Control: no-cache
                    Data Raw: 77 ee 51 67 a8 c2 dc 38 20 bc 12 53 17 05 a1 e7 44 fa 23 2e b7 b8 71 13 ca 5f 34 cb 7d 0c be 09 5f d9 5a 5d 85 11 56 95 de d3 de 12 62 eb a8 08 e0 25 70 14 f1 93 c1 00 4a d5 23 a5 0e 77 2e d9 75 a6 89 1b 16 5a c1 dd 31 ce 32 df 13 a0 62 81 87 92 a5 75 31 ed 00 f4 09 08 7f ae 0e 3e f8 65 d0 b5 42 c2 d2 95 50 fe 33 48 54 55 da 3f 44 b3 df eb cb 47 92 31 e0 5c 2c 4d 46 89 f3 f7 e8 28 63 c8 8b 2d 43 6c f6 74 39 33 7f 21 86 82 16 e9 af 01 09 96 57 45 d8 63 20 47 a2 c1 62 3c 2d 74 bb 9d 73 46 51 ff 00 e2 16 99 bd 8a 96 75 c0 cc 9b 6b c8 76 2f 7d 1f 55 df 13 a3 4e 79 3d 0a 7d c1 09 f3 25 b0 1a 81 32 06 db 60 eb aa f9 77 7f 4f d5 65 00 d6 0f 40 ae d6 80 7d 6d d3 ee 85 09 f6 22 03 2f 33 e5 8b 34 8b db c6 73 67 06 01 9b 17 0a 4e 5b 3c f2 f3 aa 73 a9 cd 5f 3c 34 db da c3 54 41 f5 ea 56 26 df 67 5a 61 72 63 60 16 79 a7 db e1 af f6 2f 66 31 e2 88 4f 2d b7 94 7e cd ce 96 27 93 d4 79 59 88 98 23 46 23 99 b4 91 75 8e c1 dc 3b dd db f3 c3 0e 36 95 96 a2 94 42 6d b3 f7 b1 24 01 e7 71 a7 5e 9b 36 26 b2 96 3c 92 d8 90 7f db 79 c4 c3 fa 4e 68 ad ba 03 e9 19 9e d0 8a 2c 33 fb bd b2 75 f0 06 1f 2a 3f 5d 5b 6a 5d b5 14 d0 23 dd 58 78 93 f6 34 14 5e 10 ba 25 6e 54 d1 9d e9 4b b7 80 6f 7e 87 f1 04 26 22 80 65 b6 e1 bb f9 5c a2 ed 76 32 ff 84 0b d3 07 45 59 19 31 0c fe 79 50 52 83 bd d4 f3 e6 d7 cc e7 56 eb b7 23 59 81 8c 16 9c 72 74 e3 4a 61 67 88 c4 db bf 46 0d 23 37 4c 63 74 58 1e 57 77 32 e6 ef 17 cd 09
                    Data Ascii: wQg8 SD#.q_4}_Z]Vb%pJ#w.uZ12bu1>eBP3HTU?DG1\,MF(c-Clt93!WEc Gb<-tsFQukv/}UNy=}%2`wOe@}m"/34sgN[<s_<4TAV&gZarc`y/f1O-~'yY#F#u;6Bm$q^6&<yNh,3u*?][j]#Xx4^%nTKo~&"e\v2EY1yPRV#YrtJagF#7LctXWw2
                    Apr 10, 2021 18:47:54.537532091 CEST284INHTTP/1.1 400 Bad Request
                    Date: Sat, 10 Apr 2021 16:47:54 GMT
                    Server: Apache/2.4.25 (Debian)
                    Content-Length: 362
                    Connection: close
                    Content-Type: text/html; charset=iso-8859-1
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 72 20 62 72 6f 77 73 65 72 20 73 65 6e 74 20 61 20 72 65 71 75 65 73 74 20 74 68 61 74 20 74 68 69 73 20 73 65 72 76 65 72 20 63 6f 75 6c 64 20 6e 6f 74 20 75 6e 64 65 72 73 74 61 6e 64 2e 3c 62 72 20 2f 3e 0a 52 65 61 73 6f 6e 3a 20 59 6f 75 27 72 65 20 73 70 65 61 6b 69 6e 67 20 70 6c 61 69 6e 20 48 54 54 50 20 74 6f 20 61 6e 20 53 53 4c 2d 65 6e 61 62 6c 65 64 20 73 65 72 76 65 72 20 70 6f 72 74 2e 3c 62 72 20 2f 3e 0a 20 49 6e 73 74 65 61 64 20 75 73 65 20 74 68 65 20 48 54 54 50 53 20 73 63 68 65 6d 65 20 74 6f 20 61 63 63 65 73 73 20 74 68 69 73 20 55 52 4c 2c 20 70 6c 65 61 73 65 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>400 Bad Request</title></head><body><h1>Bad Request</h1><p>Your browser sent a request that this server could not understand.<br />Reason: You're speaking plain HTTP to an SSL-enabled server port.<br /> Instead use the HTTPS scheme to access this URL, please.<br /></p></body></html>


                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:18:47:45
                    Start date:10/04/2021
                    Path:C:\Users\user\Desktop\zeD11Fztx8.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\zeD11Fztx8.exe'
                    Imagebase:0x1380000
                    File size:45568 bytes
                    MD5 hash:ECBC4B40DCFEC4ED1B2647B217DA0441
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.633596595.0000000001381000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000000.632271273.0000000001381000.00000020.00020000.sdmp, Author: Joe Security
                    Reputation:low

                    General

                    Start time:18:47:45
                    Start date:10/04/2021
                    Path:C:\Users\user\Desktop\zeD11Fztx8.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\zeD11Fztx8.exe
                    Imagebase:0x1380000
                    File size:45568 bytes
                    MD5 hash:ECBC4B40DCFEC4ED1B2647B217DA0441
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.640361081.0000000001381000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000000.633157257.0000000001381000.00000020.00020000.sdmp, Author: Joe Security
                    Reputation:low

                    General

                    Start time:18:47:48
                    Start date:10/04/2021
                    Path:C:\Windows\SysWOW64\storageservice.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\storageservice.exe
                    Imagebase:0x1380000
                    File size:45568 bytes
                    MD5 hash:ECBC4B40DCFEC4ED1B2647B217DA0441
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000002.00000000.638984509.0000000001381000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000002.00000002.640209506.0000000001381000.00000020.00020000.sdmp, Author: Joe Security
                    Reputation:low

                    General

                    Start time:18:47:48
                    Start date:10/04/2021
                    Path:C:\Windows\SysWOW64\storageservice.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\storageservice.exe
                    Imagebase:0x1380000
                    File size:45568 bytes
                    MD5 hash:ECBC4B40DCFEC4ED1B2647B217DA0441
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000000.639793428.0000000001381000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.898946523.0000000001381000.00000020.00020000.sdmp, Author: Joe Security
                    Reputation:low

                    General

                    Start time:18:49:17
                    Start date:10/04/2021
                    Path:C:\Windows\System32\svchost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                    Imagebase:0x7ff6eb840000
                    File size:51288 bytes
                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:18:49:35
                    Start date:10/04/2021
                    Path:C:\Windows\System32\svchost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                    Imagebase:0x7ff6eb840000
                    File size:51288 bytes
                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:18:49:49
                    Start date:10/04/2021
                    Path:C:\Windows\System32\svchost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                    Imagebase:0x7ff6eb840000
                    File size:51288 bytes
                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >