Analysis
-
max time kernel
119s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
16-11-2021 22:24
Static task
static1
General
-
Target
62d57ab293af5846fcee67bd2c5827efef35d19ccc73df41808fa18a92708100.dll
-
Size
252KB
-
MD5
830614c42388168b03b10e08a28f9562
-
SHA1
5317ca8a60f2817115c09834b0a0156c7023174b
-
SHA256
62d57ab293af5846fcee67bd2c5827efef35d19ccc73df41808fa18a92708100
-
SHA512
868ca74b6c70fcb3bda7c4e29534fcf3ff2c24e9cefa60bc035d62fcd52dbdc18d457f7546c66bfb1743fef97722a51861ccafbda0b537ea9a77190a228b2413
Malware Config
Extracted
emotet
Epoch4
81.0.236.93:443
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
45.76.176.10:8080
188.93.125.116:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 16 3484 rundll32.exe 23 3484 rundll32.exe 24 3484 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3484 rundll32.exe 3484 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2640 wrote to memory of 2660 2640 rundll32.exe rundll32.exe PID 2640 wrote to memory of 2660 2640 rundll32.exe rundll32.exe PID 2640 wrote to memory of 2660 2640 rundll32.exe rundll32.exe PID 2660 wrote to memory of 3484 2660 rundll32.exe rundll32.exe PID 2660 wrote to memory of 3484 2660 rundll32.exe rundll32.exe PID 2660 wrote to memory of 3484 2660 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62d57ab293af5846fcee67bd2c5827efef35d19ccc73df41808fa18a92708100.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62d57ab293af5846fcee67bd2c5827efef35d19ccc73df41808fa18a92708100.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\62d57ab293af5846fcee67bd2c5827efef35d19ccc73df41808fa18a92708100.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3484