Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 12:00
Static task
static1
Behavioral task
behavioral1
Sample
emotet_exe_e1_f9e1b462ba46330f565d8177bb919e16c28e33c87795c0e69e70a6b9b5379ae1_2021-01-13__115918.exe.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_exe_e1_f9e1b462ba46330f565d8177bb919e16c28e33c87795c0e69e70a6b9b5379ae1_2021-01-13__115918.exe.dll
Resource
win10v20201028
General
-
Target
emotet_exe_e1_f9e1b462ba46330f565d8177bb919e16c28e33c87795c0e69e70a6b9b5379ae1_2021-01-13__115918.exe.dll
-
Size
271KB
-
MD5
9ae30ac08cd4f48f7e3ab9f954f128fd
-
SHA1
afd1652a90606c26ea30cba2833c03a47101e6d2
-
SHA256
f9e1b462ba46330f565d8177bb919e16c28e33c87795c0e69e70a6b9b5379ae1
-
SHA512
4656a482324a5c82c3e53eae13d82c0267f2e406e9a9af1ab80154d3d3f2a5e1da73dc3e4490792f57c78c671bb67f4e413a54ffde33766c27592a623a76a87a
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 6 1520 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1520 rundll32.exe 1520 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1972 wrote to memory of 1520 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1520 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1520 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1520 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1520 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1520 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1520 1972 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\emotet_exe_e1_f9e1b462ba46330f565d8177bb919e16c28e33c87795c0e69e70a6b9b5379ae1_2021-01-13__115918.exe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\emotet_exe_e1_f9e1b462ba46330f565d8177bb919e16c28e33c87795c0e69e70a6b9b5379ae1_2021-01-13__115918.exe.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1520
-