Analysis
-
max time kernel
146s -
max time network
212s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
16-11-2021 20:57
Static task
static1
General
-
Target
d73bc419b9428ecc36a25cc767225b01782ac9381dabcc44177063c08010ae4e.dll
-
Size
252KB
-
MD5
b79f31ffcf607155295dfdcbc82f7069
-
SHA1
a0e713e968553dc010561c9363b42bd42fa5a80b
-
SHA256
d73bc419b9428ecc36a25cc767225b01782ac9381dabcc44177063c08010ae4e
-
SHA512
b07c0e40e0572a3a4b79a2a2a7aee6e7f410e3a1d873681dfed7aca46d5e2e125b0cb9d83f3732d59711722e0f6423a2f2be67aa287d8263449386691fed389f
Malware Config
Extracted
emotet
Epoch4
81.0.236.93:443
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
45.76.176.10:8080
188.93.125.116:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 15 4084 rundll32.exe 22 4084 rundll32.exe 24 4084 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4084 rundll32.exe 4084 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2472 wrote to memory of 2616 2472 rundll32.exe rundll32.exe PID 2472 wrote to memory of 2616 2472 rundll32.exe rundll32.exe PID 2472 wrote to memory of 2616 2472 rundll32.exe rundll32.exe PID 2616 wrote to memory of 4084 2616 rundll32.exe rundll32.exe PID 2616 wrote to memory of 4084 2616 rundll32.exe rundll32.exe PID 2616 wrote to memory of 4084 2616 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d73bc419b9428ecc36a25cc767225b01782ac9381dabcc44177063c08010ae4e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d73bc419b9428ecc36a25cc767225b01782ac9381dabcc44177063c08010ae4e.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\d73bc419b9428ecc36a25cc767225b01782ac9381dabcc44177063c08010ae4e.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4084