Analysis
-
max time kernel
108s -
max time network
110s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
07-12-2021 22:15
Static task
static1
General
-
Target
904ff20f81477a51d0cc0291329b983f01e5ac51d51d91d2daa13f654df0bfdc.dll
-
Size
1.3MB
-
MD5
4636421ce625131800ea373dca6fa80d
-
SHA1
271c98c1594b666f724cd31de2e3fa3eb5209559
-
SHA256
904ff20f81477a51d0cc0291329b983f01e5ac51d51d91d2daa13f654df0bfdc
-
SHA512
038a4784e0ac181cad46496204fbc11373449ac2416036e8975b47390687a42132aa451c22e3a62a2f200520439507a8c7167b5eb5f7d97cf5c4ac0353c94693
Malware Config
Extracted
emotet
Epoch5
209.239.112.82:8080
116.124.128.206:8080
45.63.5.129:443
128.199.192.135:8080
51.178.61.60:443
168.197.250.14:80
177.72.80.14:7080
51.210.242.234:8080
142.4.219.173:8080
78.47.204.80:443
78.46.73.125:443
37.44.244.177:8080
37.59.209.141:8080
104.131.62.48:8080
190.90.233.66:443
185.148.168.220:8080
185.148.168.15:8080
62.171.178.147:8080
191.252.103.16:80
54.38.242.185:443
85.214.67.203:8080
217.182.143.207:443
159.69.237.188:443
210.57.209.142:8080
54.37.228.122:443
207.148.81.119:8080
195.77.239.39:8080
66.42.57.149:443
195.154.146.35:443
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2620 2504 regsvr32.exe 68 PID 2504 wrote to memory of 2620 2504 regsvr32.exe 68 PID 2504 wrote to memory of 2620 2504 regsvr32.exe 68 PID 2620 wrote to memory of 3232 2620 regsvr32.exe 69 PID 2620 wrote to memory of 3232 2620 regsvr32.exe 69 PID 2620 wrote to memory of 3232 2620 regsvr32.exe 69
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\904ff20f81477a51d0cc0291329b983f01e5ac51d51d91d2daa13f654df0bfdc.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\904ff20f81477a51d0cc0291329b983f01e5ac51d51d91d2daa13f654df0bfdc.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\904ff20f81477a51d0cc0291329b983f01e5ac51d51d91d2daa13f654df0bfdc.dll",DllRegisterServer3⤵PID:3232
-
-