Analysis
-
max time kernel
120s -
max time network
154s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 00:03
Static task
static1
Behavioral task
behavioral1
Sample
emotet_exe_e1_b9acca30f236050f9b154b71bc3ee0d685e3472c3c985422b1bf7058960d8ef6_2021-01-13__000232.exe.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_exe_e1_b9acca30f236050f9b154b71bc3ee0d685e3472c3c985422b1bf7058960d8ef6_2021-01-13__000232.exe.dll
Resource
win10v20201028
General
-
Target
emotet_exe_e1_b9acca30f236050f9b154b71bc3ee0d685e3472c3c985422b1bf7058960d8ef6_2021-01-13__000232.exe.dll
-
Size
275KB
-
MD5
aabbc09cfa3ea98b7eae6acf85f33d46
-
SHA1
9ce533452262a59d1ee42a92c7d1e8cc1f83c858
-
SHA256
b9acca30f236050f9b154b71bc3ee0d685e3472c3c985422b1bf7058960d8ef6
-
SHA512
962fa8dfcbad3ba553342f38e6b23855fe856111407b916c46eee2733b4c7d73371620284b36683f7f89ae1856eed7aba14861a2a313b6b43003f6a6a6f3e85b
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 7 1976 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1976 rundll32.exe 1976 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1068 wrote to memory of 1976 1068 rundll32.exe rundll32.exe PID 1068 wrote to memory of 1976 1068 rundll32.exe rundll32.exe PID 1068 wrote to memory of 1976 1068 rundll32.exe rundll32.exe PID 1068 wrote to memory of 1976 1068 rundll32.exe rundll32.exe PID 1068 wrote to memory of 1976 1068 rundll32.exe rundll32.exe PID 1068 wrote to memory of 1976 1068 rundll32.exe rundll32.exe PID 1068 wrote to memory of 1976 1068 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\emotet_exe_e1_b9acca30f236050f9b154b71bc3ee0d685e3472c3c985422b1bf7058960d8ef6_2021-01-13__000232.exe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\emotet_exe_e1_b9acca30f236050f9b154b71bc3ee0d685e3472c3c985422b1bf7058960d8ef6_2021-01-13__000232.exe.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1976
-