Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
18/11/2021, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
696e5bfe78999005ae36b9e2d2b426bf.dll
Resource
win7-en-20211104
General
-
Target
696e5bfe78999005ae36b9e2d2b426bf.dll
-
Size
259KB
-
MD5
696e5bfe78999005ae36b9e2d2b426bf
-
SHA1
be9525dd3c11e033562fa339a111fbde20790cd3
-
SHA256
b4c37dde6546566bb11ff568d9a930b4fee72556d8e6221ccf97a41c0be654e1
-
SHA512
a6e8fdfd35a2dd25178a5885d44302a90dc9cc76786093e681ae24cf208eb8dd84058ad22be77a7201e2bb888bd7f95db1f16383f65b486e22396be2d2d24576
Malware Config
Extracted
emotet
Epoch5
51.178.61.60:443
168.197.250.14:80
45.79.33.48:8080
196.44.98.190:8080
177.72.80.14:7080
51.210.242.234:8080
185.148.169.10:8080
142.4.219.173:8080
78.47.204.80:443
78.46.73.125:443
37.44.244.177:8080
37.59.209.141:8080
191.252.103.16:80
54.38.242.185:443
85.214.67.203:8080
54.37.228.122:443
207.148.81.119:8080
195.77.239.39:8080
66.42.57.149:443
195.154.146.35:443
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 18 3032 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Fuwdhgofou\gkrixfzwlrbx.urt rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3032 rundll32.exe 3032 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3924 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4060 wrote to memory of 3480 4060 rundll32.exe 69 PID 4060 wrote to memory of 3480 4060 rundll32.exe 69 PID 4060 wrote to memory of 3480 4060 rundll32.exe 69 PID 3480 wrote to memory of 3924 3480 rundll32.exe 70 PID 3480 wrote to memory of 3924 3480 rundll32.exe 70 PID 3480 wrote to memory of 3924 3480 rundll32.exe 70 PID 3924 wrote to memory of 1320 3924 rundll32.exe 71 PID 3924 wrote to memory of 1320 3924 rundll32.exe 71 PID 3924 wrote to memory of 1320 3924 rundll32.exe 71 PID 1320 wrote to memory of 3032 1320 rundll32.exe 72 PID 1320 wrote to memory of 3032 1320 rundll32.exe 72 PID 1320 wrote to memory of 3032 1320 rundll32.exe 72
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\696e5bfe78999005ae36b9e2d2b426bf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\696e5bfe78999005ae36b9e2d2b426bf.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\696e5bfe78999005ae36b9e2d2b426bf.dll",Control_RunDLL3⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Fuwdhgofou\gkrixfzwlrbx.urt",uwBEQGaaMquf4⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Fuwdhgofou\gkrixfzwlrbx.urt",Control_RunDLL5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
-
-