Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
16-11-2021 21:46
Static task
static1
Behavioral task
behavioral1
Sample
1dfaf39642098ae3f698be2cead39866.dll
Resource
win7-en-20211014
General
-
Target
1dfaf39642098ae3f698be2cead39866.dll
-
Size
252KB
-
MD5
1dfaf39642098ae3f698be2cead39866
-
SHA1
6cdbce2a942ab56630eef948b46b4414fa9355df
-
SHA256
bda2e4103023333799ded1b5d00c7a2f0bb81c7f1aa5b5afbfa9a7944269f9d3
-
SHA512
9ca60b62ee25c129dd1ebf3ddd616d995abc1e581361526c7e025bd8e8ca85f8d72e2bf57d309094a61406fd3fd05132e1cd6e0be4e8f8e2a752afd3dc080a9d
Malware Config
Extracted
emotet
Epoch4
81.0.236.93:443
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
45.76.176.10:8080
188.93.125.116:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
suricata: ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)
suricata: ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 16 2552 rundll32.exe 23 2552 rundll32.exe 24 2552 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 2552 rundll32.exe 2552 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3700 wrote to memory of 3716 3700 rundll32.exe rundll32.exe PID 3700 wrote to memory of 3716 3700 rundll32.exe rundll32.exe PID 3700 wrote to memory of 3716 3700 rundll32.exe rundll32.exe PID 3716 wrote to memory of 2552 3716 rundll32.exe rundll32.exe PID 3716 wrote to memory of 2552 3716 rundll32.exe rundll32.exe PID 3716 wrote to memory of 2552 3716 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1dfaf39642098ae3f698be2cead39866.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1dfaf39642098ae3f698be2cead39866.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\1dfaf39642098ae3f698be2cead39866.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2552