Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
16-11-2021 22:24
Static task
static1
General
-
Target
2534d7ced3fdec226208c065ac7df42680bf56f73db5f42f16f5094ef22be973.dll
-
Size
252KB
-
MD5
7274b939a3f62c1d00971663d32c5777
-
SHA1
1a9d18a6710743ce4120d2d8e8aa52dd4a9c0d97
-
SHA256
2534d7ced3fdec226208c065ac7df42680bf56f73db5f42f16f5094ef22be973
-
SHA512
b7a96411a965d081b4e7bdc0dd4037d1015305ff97928178c5f7e5d1c4173e2e67ff7f44415065d755e8012f080c81875b3f6dbf1d91f81757a31f8c42db0d55
Malware Config
Extracted
emotet
Epoch4
81.0.236.93:443
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
45.76.176.10:8080
188.93.125.116:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 21 3612 rundll32.exe 26 3612 rundll32.exe 27 3612 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3612 rundll32.exe 3612 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3736 wrote to memory of 1008 3736 rundll32.exe rundll32.exe PID 3736 wrote to memory of 1008 3736 rundll32.exe rundll32.exe PID 3736 wrote to memory of 1008 3736 rundll32.exe rundll32.exe PID 1008 wrote to memory of 3612 1008 rundll32.exe rundll32.exe PID 1008 wrote to memory of 3612 1008 rundll32.exe rundll32.exe PID 1008 wrote to memory of 3612 1008 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2534d7ced3fdec226208c065ac7df42680bf56f73db5f42f16f5094ef22be973.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2534d7ced3fdec226208c065ac7df42680bf56f73db5f42f16f5094ef22be973.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\2534d7ced3fdec226208c065ac7df42680bf56f73db5f42f16f5094ef22be973.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3612