Analysis
-
max time kernel
124s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
16-11-2021 21:34
Static task
static1
General
-
Target
85a94f69dd7c66f94070de801cc5571231084948ad691df09e20bd5ec62a7ea1.dll
-
Size
252KB
-
MD5
a123d2853b5cc5a9a608e0de1cb7b5f2
-
SHA1
a2cbbea474cc52ce7d9074a03103b4e736f4d189
-
SHA256
85a94f69dd7c66f94070de801cc5571231084948ad691df09e20bd5ec62a7ea1
-
SHA512
768e40633872858bdee12fdd0aa5fc612ec3d7b29fb42bd1ef3390400549797d3724c746bc60add7982d25c54e209ec17392f8d9722c91d21fee290fdd543ac7
Malware Config
Extracted
emotet
Epoch4
81.0.236.93:443
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
45.76.176.10:8080
188.93.125.116:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 21 4048 rundll32.exe 26 4048 rundll32.exe 27 4048 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4048 rundll32.exe 4048 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3992 wrote to memory of 3952 3992 rundll32.exe rundll32.exe PID 3992 wrote to memory of 3952 3992 rundll32.exe rundll32.exe PID 3992 wrote to memory of 3952 3992 rundll32.exe rundll32.exe PID 3952 wrote to memory of 4048 3952 rundll32.exe rundll32.exe PID 3952 wrote to memory of 4048 3952 rundll32.exe rundll32.exe PID 3952 wrote to memory of 4048 3952 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85a94f69dd7c66f94070de801cc5571231084948ad691df09e20bd5ec62a7ea1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85a94f69dd7c66f94070de801cc5571231084948ad691df09e20bd5ec62a7ea1.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\85a94f69dd7c66f94070de801cc5571231084948ad691df09e20bd5ec62a7ea1.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4048