Overview
overview
10Static
static
NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10NoNet
windows10_x64
10Analysis
-
max time kernel
576s -
max time network
584s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-01-2021 19:01
Static task
static1
Behavioral task
behavioral1
Sample
E1-20210122_075422.dll
Resource
win10v20201028
Behavioral task
behavioral2
Sample
E1-20210122_102150.dll
Resource
win10v20201028
Behavioral task
behavioral3
Sample
E1-20210122_132254.dll
Resource
win10v20201028
Behavioral task
behavioral4
Sample
E1-20210122_155035.dll
Resource
win10v20201028
Behavioral task
behavioral5
Sample
E1-20210122_214129.dll
Resource
win10v20201028
Behavioral task
behavioral6
Sample
E2-20210122_075416.dll
Resource
win10v20201028
Behavioral task
behavioral7
Sample
E2-20210122_102146.dll
Resource
win10v20201028
Behavioral task
behavioral8
Sample
E2-20210122_132251.dll
Resource
win10v20201028
Behavioral task
behavioral9
Sample
E2-20210122_155032.dll
Resource
win10v20201028
Behavioral task
behavioral10
Sample
E2-20210122_214126.dll
Resource
win10v20201028
Behavioral task
behavioral11
Sample
E3-20210122_075431.dll
Resource
win10v20201028
Behavioral task
behavioral12
Sample
E3-20210122_102153.dll
Resource
win10v20201028
Behavioral task
behavioral13
Sample
E3-20210122_132257.dll
Resource
win10v20201028
Behavioral task
behavioral14
Sample
E3-20210122_155039.dll
Resource
win10v20201028
Behavioral task
behavioral15
Sample
E3-20210122_214135.dll
Resource
win10v20201028
General
-
Target
E3-20210122_155039.dll
-
Size
330KB
-
MD5
9fd0fb7aa4596c60af7215ae2e0ee308
-
SHA1
48ea4fdd108557529540568e2b26dbd3c4f69ac9
-
SHA256
80a2a7a9b7aba82b6a04a19170c2e85c3680881da0c00580721ac6b82136cff6
-
SHA512
b70a5d3f85a7337cc3daf1f0f7026d6d9f3927b482a9d4931c9b6bc4e11656277b99e5f747db0de37a661c828e032a1dfdad1a46ea7b27612ee09d666037e740
Malware Config
Extracted
emotet
Epoch3
190.55.186.229:80
203.157.152.9:7080
157.245.145.87:443
109.99.146.210:8080
116.202.10.123:8080
172.96.190.154:8080
163.53.204.180:443
190.107.118.125:80
91.93.3.85:8080
185.142.236.163:443
115.79.195.246:80
120.51.34.254:80
192.210.217.94:8080
198.20.228.9:8080
91.75.75.46:80
54.38.143.245:8080
161.49.84.2:80
162.144.145.58:8080
178.33.167.120:8080
201.193.160.196:80
143.95.101.72:8080
37.205.9.252:7080
178.62.254.156:8080
103.80.51.61:8080
74.208.173.91:8080
203.153.216.178:7080
152.32.75.74:443
37.46.129.215:8080
70.32.89.105:8080
179.233.3.89:80
132.248.38.158:80
103.229.73.17:8080
2.58.16.86:8080
82.78.179.117:443
139.59.61.215:443
75.127.14.170:8080
78.90.78.210:80
122.116.104.238:8443
5.79.70.250:8080
182.73.7.59:8080
192.163.221.191:8080
139.59.12.63:8080
190.19.169.69:443
58.27.215.3:8080
201.163.74.204:80
175.103.38.146:80
139.5.101.203:80
201.212.61.66:80
117.2.139.117:443
186.96.170.61:80
50.116.78.109:8080
68.133.75.203:8080
183.91.3.63:80
65.32.168.171:80
172.104.46.84:8080
27.78.27.110:443
172.193.14.201:80
103.93.220.182:80
49.206.16.156:80
223.17.215.76:80
203.56.191.129:8080
195.159.28.244:8080
195.201.56.70:8080
110.37.224.243:80
110.172.180.180:8080
188.166.220.180:7080
180.148.4.130:8080
157.7.164.178:8081
88.58.209.2:80
91.83.93.103:443
24.230.124.78:80
8.4.9.137:8080
203.160.167.243:80
192.241.220.183:8080
79.133.6.236:8080
186.146.229.172:80
46.105.131.68:8080
178.254.36.182:8080
46.32.229.152:8080
202.29.237.113:8080
185.208.226.142:8080
2.82.75.215:80
190.85.46.52:7080
190.18.184.113:80
188.226.165.170:8080
Signatures
-
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 16 3308 rundll32.exe 18 3308 rundll32.exe 19 3308 rundll32.exe 20 3308 rundll32.exe 22 3308 rundll32.exe 23 3308 rundll32.exe 24 3308 rundll32.exe 25 3308 rundll32.exe 26 3308 rundll32.exe 27 3308 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ibbfrvdyk\wpowjutr.vsa rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
rundll32.exepid process 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 3516 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
rundll32.exerundll32.exerundll32.exedescription pid process target process PID 3976 wrote to memory of 3516 3976 rundll32.exe rundll32.exe PID 3976 wrote to memory of 3516 3976 rundll32.exe rundll32.exe PID 3976 wrote to memory of 3516 3976 rundll32.exe rundll32.exe PID 3516 wrote to memory of 3228 3516 rundll32.exe rundll32.exe PID 3516 wrote to memory of 3228 3516 rundll32.exe rundll32.exe PID 3516 wrote to memory of 3228 3516 rundll32.exe rundll32.exe PID 3228 wrote to memory of 3308 3228 rundll32.exe rundll32.exe PID 3228 wrote to memory of 3308 3228 rundll32.exe rundll32.exe PID 3228 wrote to memory of 3308 3228 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E3-20210122_155039.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E3-20210122_155039.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ibbfrvdyk\wpowjutr.vsa",kJfrsMeEmsIRnD3⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ibbfrvdyk\wpowjutr.vsa",#14⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
-