Analysis
-
max time kernel
110s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
25-11-2021 16:08
Static task
static1
Behavioral task
behavioral1
Sample
0c32d4334246cc061e80fc9cf0780a58.dll
Resource
win7-en-20211104
General
-
Target
0c32d4334246cc061e80fc9cf0780a58.dll
-
Size
653KB
-
MD5
0c32d4334246cc061e80fc9cf0780a58
-
SHA1
eec70a7ff5e0ed8adb1bba38021dc2fdf0b1081d
-
SHA256
c4e9dbb3e3b37e36574a8d963f3ba83d61beceedfb640e9592b0a416396ca46e
-
SHA512
9b43a99ea386c9203fe9269cc125c95be37a474058b997794dc62913e1b7efdccba5c6c06d51e3daa943bb6369a43c7f30364966670a0f56eb75ddaf9fd126cc
Malware Config
Extracted
emotet
Epoch5
51.178.61.60:443
168.197.250.14:80
45.79.33.48:8080
196.44.98.190:8080
177.72.80.14:7080
51.210.242.234:8080
185.148.169.10:8080
142.4.219.173:8080
78.47.204.80:443
78.46.73.125:443
37.44.244.177:8080
37.59.209.141:8080
191.252.103.16:80
54.38.242.185:443
85.214.67.203:8080
54.37.228.122:443
207.148.81.119:8080
195.77.239.39:8080
66.42.57.149:443
195.154.146.35:443
Signatures
-
suricata: ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)
suricata: ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 16 3656 rundll32.exe 17 3656 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3656 rundll32.exe 3656 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2436 wrote to memory of 2656 2436 rundll32.exe rundll32.exe PID 2436 wrote to memory of 2656 2436 rundll32.exe rundll32.exe PID 2436 wrote to memory of 2656 2436 rundll32.exe rundll32.exe PID 2656 wrote to memory of 3656 2656 rundll32.exe rundll32.exe PID 2656 wrote to memory of 3656 2656 rundll32.exe rundll32.exe PID 2656 wrote to memory of 3656 2656 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c32d4334246cc061e80fc9cf0780a58.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c32d4334246cc061e80fc9cf0780a58.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\0c32d4334246cc061e80fc9cf0780a58.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2656-118-0x0000000000000000-mapping.dmp
-
memory/2656-119-0x0000000000B20000-0x0000000000B48000-memory.dmpFilesize
160KB
-
memory/3656-122-0x0000000000000000-mapping.dmp
-
memory/3656-123-0x0000000000AC0000-0x0000000000AE8000-memory.dmpFilesize
160KB
-
memory/3656-126-0x00000000049E0000-0x0000000004A08000-memory.dmpFilesize
160KB
-
memory/3656-129-0x0000000004BC0000-0x0000000004BE8000-memory.dmpFilesize
160KB
-
memory/3656-132-0x0000000004CA0000-0x0000000004CC8000-memory.dmpFilesize
160KB
-
memory/3656-135-0x0000000004D80000-0x0000000004DA8000-memory.dmpFilesize
160KB
-
memory/3656-138-0x0000000004E60000-0x0000000004E88000-memory.dmpFilesize
160KB