94c793c741698a75da4246ef790ce366534ddf5d620533c68f004b1f142de218
94c793c741698a75da4246ef790ce366534ddf5d620533c68f004b1f142de218.dll
653KB
25-11-2021 16:49
4a2de25016b471b380c4eb430f61ef0d
ed79dc00e10ff969bb35322e023f1f9c1750b602
94c793c741698a75da4246ef790ce366534ddf5d620533c68f004b1f142de218
Extracted
Family | emotet |
Botnet | Epoch5 |
C2 |
51.178.61.60:443 168.197.250.14:80 45.79.33.48:8080 196.44.98.190:8080 177.72.80.14:7080 51.210.242.234:8080 185.148.169.10:8080 142.4.219.173:8080 78.47.204.80:443 78.46.73.125:443 37.44.244.177:8080 37.59.209.141:8080 191.252.103.16:80 54.38.242.185:443 85.214.67.203:8080 54.37.228.122:443 207.148.81.119:8080 195.77.239.39:8080 66.42.57.149:443 195.154.146.35:443 |
eck1.plain |
|
ecs1.plain |
|
Filter: none
-
Emotet
Description
Emotet is a trojan that is primarily spread through spam emails.
Tags
-
suricata: ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)
Description
suricata: ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)
Tags
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Description
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Tags
-
Blocklisted process makes network requestrundll32.exe
Reported IOCs
flow pid process 18 2776 rundll32.exe -
Drops file in System32 directoryrundll32.exe
Reported IOCs
description ioc process File opened for modification C:\Windows\SysWOW64\Lyaxhhsbw\vlbkzgcuftjpa.sfm rundll32.exe -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Suspicious behavior: EnumeratesProcessesrundll32.exe
Reported IOCs
pid process 2776 rundll32.exe 2776 rundll32.exe -
Suspicious behavior: RenamesItselfrundll32.exe
Reported IOCs
pid process 4664 rundll32.exe -
Suspicious use of WriteProcessMemoryrundll32.exerundll32.exerundll32.exerundll32.exe
Reported IOCs
description pid process target process PID 1636 wrote to memory of 4576 1636 rundll32.exe rundll32.exe PID 1636 wrote to memory of 4576 1636 rundll32.exe rundll32.exe PID 1636 wrote to memory of 4576 1636 rundll32.exe rundll32.exe PID 4576 wrote to memory of 4664 4576 rundll32.exe rundll32.exe PID 4576 wrote to memory of 4664 4576 rundll32.exe rundll32.exe PID 4576 wrote to memory of 4664 4576 rundll32.exe rundll32.exe PID 4664 wrote to memory of 2224 4664 rundll32.exe rundll32.exe PID 4664 wrote to memory of 2224 4664 rundll32.exe rundll32.exe PID 4664 wrote to memory of 2224 4664 rundll32.exe rundll32.exe PID 2224 wrote to memory of 2776 2224 rundll32.exe rundll32.exe PID 2224 wrote to memory of 2776 2224 rundll32.exe rundll32.exe PID 2224 wrote to memory of 2776 2224 rundll32.exe rundll32.exe
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94c793c741698a75da4246ef790ce366534ddf5d620533c68f004b1f142de218.dll,#1Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94c793c741698a75da4246ef790ce366534ddf5d620533c68f004b1f142de218.dll,#1Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\94c793c741698a75da4246ef790ce366534ddf5d620533c68f004b1f142de218.dll",Control_RunDLLDrops file in System32 directorySuspicious behavior: RenamesItselfSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lyaxhhsbw\vlbkzgcuftjpa.sfm",nUIbtGnRxSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Lyaxhhsbw\vlbkzgcuftjpa.sfm",Control_RunDLLBlocklisted process makes network requestSuspicious behavior: EnumeratesProcesses
-
memory/2224-138-0x0000000000000000-mapping.dmp
-
memory/2224-140-0x0000000004A60000-0x0000000004A88000-memory.dmp
-
memory/2776-155-0x00000000057A0000-0x00000000057C8000-memory.dmp
-
memory/2776-152-0x00000000056C0000-0x00000000056E8000-memory.dmp
-
memory/2776-149-0x00000000053C0000-0x00000000053E8000-memory.dmp
-
memory/2776-146-0x0000000004E40000-0x0000000004E68000-memory.dmp
-
memory/2776-145-0x0000000000000000-mapping.dmp
-
memory/2776-158-0x0000000005880000-0x00000000058A8000-memory.dmp
-
memory/2776-161-0x0000000005960000-0x0000000005988000-memory.dmp
-
memory/4576-119-0x0000000002D40000-0x0000000002D68000-memory.dmp
-
memory/4576-118-0x0000000000000000-mapping.dmp
-
memory/4664-135-0x0000000004A20000-0x0000000004A48000-memory.dmp
-
memory/4664-129-0x0000000004820000-0x0000000004848000-memory.dmp
-
memory/4664-126-0x0000000004640000-0x0000000004668000-memory.dmp
-
memory/4664-123-0x0000000004110000-0x0000000004138000-memory.dmp
-
memory/4664-122-0x0000000000000000-mapping.dmp
-
memory/4664-139-0x0000000004B80000-0x0000000004BA8000-memory.dmp
-
memory/4664-132-0x00000000049C0000-0x00000000049E8000-memory.dmp