Analysis
-
max time kernel
121s -
max time network
214s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
16-11-2021 21:47
Static task
static1
General
-
Target
75c7661ea1410b0238e571bb3c77fa6ae211a35291663c246091d3d797b82439.dll
-
Size
252KB
-
MD5
7e57267a065811d491764b49c6e9ed9d
-
SHA1
52dd39a5b2cde39034446ab15f3971e3ef1e7755
-
SHA256
75c7661ea1410b0238e571bb3c77fa6ae211a35291663c246091d3d797b82439
-
SHA512
0a669360476cbe6c4f54ec18088fdc8ae8ec76960e7ae1ff7dc0151dab2d53ade42c744b364d33e3489681a878efa737a2479a6283970ac1d074cc8b8be0f4cd
Malware Config
Extracted
emotet
Epoch4
81.0.236.93:443
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
45.76.176.10:8080
188.93.125.116:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 8 3692 rundll32.exe 21 3692 rundll32.exe 23 3692 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3692 rundll32.exe 3692 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2480 wrote to memory of 2668 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 2668 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 2668 2480 rundll32.exe rundll32.exe PID 2668 wrote to memory of 3692 2668 rundll32.exe rundll32.exe PID 2668 wrote to memory of 3692 2668 rundll32.exe rundll32.exe PID 2668 wrote to memory of 3692 2668 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75c7661ea1410b0238e571bb3c77fa6ae211a35291663c246091d3d797b82439.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75c7661ea1410b0238e571bb3c77fa6ae211a35291663c246091d3d797b82439.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\75c7661ea1410b0238e571bb3c77fa6ae211a35291663c246091d3d797b82439.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3692