Analysis
-
max time kernel
19s -
max time network
21s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-01-2021 11:23
Static task
static1
General
-
Target
d6f01232a80a0be3d54f58cc856a5582378b2678066000172381602c174299ad.dll
-
Size
348KB
-
MD5
2a7b4fe52153defcfc316f3e903c4d24
-
SHA1
35917e76c8a56730c75a96a1b9b5a0c973abf45c
-
SHA256
d6f01232a80a0be3d54f58cc856a5582378b2678066000172381602c174299ad
-
SHA512
29c6d824faa32953bb23a85c47da54488711b306751e75fe63d529d52efabbe4a9e2b78a28fff46105f1464792f328ddd02efd66fbcead807b1ed19c4178548a
Malware Config
Extracted
emotet
Epoch1
152.231.89.226:80
2.58.16.88:8080
206.189.232.2:8080
154.127.113.242:80
190.114.254.163:8080
190.210.246.253:80
138.197.99.250:8080
172.104.169.32:8080
85.214.26.7:8080
152.170.79.100:80
190.45.24.210:80
143.0.85.206:7080
46.43.2.95:8080
110.39.162.2:443
1.226.84.243:8080
87.106.46.107:8080
111.67.12.221:8080
137.74.106.111:7080
81.17.93.134:80
62.84.75.50:80
51.255.165.160:8080
177.23.7.151:80
51.15.7.145:80
178.211.45.66:8080
170.81.48.2:80
178.250.54.208:8080
200.75.39.254:80
191.223.36.170:80
186.177.174.163:80
202.134.4.210:7080
138.97.60.140:8080
190.247.139.101:80
185.94.252.27:443
152.169.22.67:80
190.24.243.186:80
190.251.216.100:80
80.15.100.37:80
192.232.229.53:4143
5.196.35.138:7080
78.206.229.130:80
191.241.233.198:80
110.39.160.38:443
46.105.114.137:8080
93.146.143.191:80
172.245.248.239:8080
81.215.230.173:443
190.162.232.138:80
82.208.146.142:7080
31.27.59.105:80
190.64.88.186:443
68.183.170.114:8080
192.175.111.212:7080
197.232.36.108:80
217.13.106.14:8080
185.183.16.47:80
70.32.115.157:8080
91.233.197.70:80
187.162.248.237:80
104.131.41.185:8080
209.236.123.42:8080
188.135.15.49:80
95.76.153.115:80
201.241.127.190:80
46.101.58.37:8080
83.144.109.70:80
94.176.234.118:443
93.149.120.214:80
105.209.235.113:8080
177.85.167.10:80
138.97.60.141:7080
12.162.84.2:8080
80.249.176.206:80
211.215.18.93:8080
188.225.32.231:7080
60.93.23.51:80
50.28.51.143:8080
181.30.61.163:443
149.202.72.142:7080
155.186.9.160:80
45.16.226.117:443
12.163.208.58:80
70.32.84.74:8080
82.48.39.246:80
122.201.23.45:443
68.183.190.199:8080
167.71.148.58:443
202.79.24.136:443
81.214.253.80:443
83.169.21.32:7080
212.71.237.140:8080
213.52.74.198:80
201.185.69.28:443
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 10 3632 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3632 rundll32.exe 3632 rundll32.exe 3632 rundll32.exe 3632 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1204 wrote to memory of 3632 1204 rundll32.exe 72 PID 1204 wrote to memory of 3632 1204 rundll32.exe 72 PID 1204 wrote to memory of 3632 1204 rundll32.exe 72
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6f01232a80a0be3d54f58cc856a5582378b2678066000172381602c174299ad.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6f01232a80a0be3d54f58cc856a5582378b2678066000172381602c174299ad.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3632
-