Analysis
-
max time kernel
124s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
16-11-2021 22:30
Static task
static1
General
-
Target
b146a3fcca2e592d516c0e0616ac9ff9d5519b04fc06116ba34d2b7fb09b800a.dll
-
Size
252KB
-
MD5
dd585193342959a772d736a6f304c81d
-
SHA1
8728521b21bea5c826b90dcc153068955736362b
-
SHA256
b146a3fcca2e592d516c0e0616ac9ff9d5519b04fc06116ba34d2b7fb09b800a
-
SHA512
73c7aee74373db9795bc7972f40f8b398e944c8ac80cf54f1c171c77bd991f30c3bb2097a9fda0ba90c0af345c4729d9a7b57165d538000a0f23a45b5372e763
Malware Config
Extracted
emotet
Epoch4
81.0.236.93:443
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
45.76.176.10:8080
188.93.125.116:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
suricata: ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)
suricata: ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 20 3992 rundll32.exe 27 3992 rundll32.exe 29 3992 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3992 rundll32.exe 3992 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3704 wrote to memory of 3836 3704 rundll32.exe rundll32.exe PID 3704 wrote to memory of 3836 3704 rundll32.exe rundll32.exe PID 3704 wrote to memory of 3836 3704 rundll32.exe rundll32.exe PID 3836 wrote to memory of 3992 3836 rundll32.exe rundll32.exe PID 3836 wrote to memory of 3992 3836 rundll32.exe rundll32.exe PID 3836 wrote to memory of 3992 3836 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b146a3fcca2e592d516c0e0616ac9ff9d5519b04fc06116ba34d2b7fb09b800a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b146a3fcca2e592d516c0e0616ac9ff9d5519b04fc06116ba34d2b7fb09b800a.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\b146a3fcca2e592d516c0e0616ac9ff9d5519b04fc06116ba34d2b7fb09b800a.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3992