Analysis
-
max time kernel
122s -
max time network
118s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-01-2022 20:25
Static task
static1
General
-
Target
2949a3d8bc89fb436b02ee417dd1230d9f3dc4fa1cc6364a6b900b61332e906f.dll
-
Size
408KB
-
MD5
85153957055f63983359ecdb3eccd511
-
SHA1
e3cd19a5a5c1fc3025d90d11f9d79e741261f6d6
-
SHA256
2949a3d8bc89fb436b02ee417dd1230d9f3dc4fa1cc6364a6b900b61332e906f
-
SHA512
b845c7ec4d63ac5cfbbea877926037d06ccb2cb3ec8ffe77017f49d0e8f250407da1c4c0e8173aa1b8849d1bd6d8f9a05b06fd4046523023061bf00440a23b21
Malware Config
Extracted
emotet
Epoch5
45.138.98.34:80
69.16.218.101:8080
51.210.242.234:8080
185.148.168.220:8080
142.4.219.173:8080
54.38.242.185:443
191.252.103.16:80
104.131.62.48:8080
62.171.178.147:8080
217.182.143.207:443
168.197.250.14:80
37.44.244.177:8080
66.42.57.149:443
210.57.209.142:8080
159.69.237.188:443
116.124.128.206:8080
128.199.192.135:8080
195.154.146.35:443
185.148.168.15:8080
195.77.239.39:8080
207.148.81.119:8080
85.214.67.203:8080
190.90.233.66:443
78.46.73.125:443
78.47.204.80:443
37.59.209.141:8080
54.37.228.122:443
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2572 wrote to memory of 2620 2572 regsvr32.exe regsvr32.exe PID 2572 wrote to memory of 2620 2572 regsvr32.exe regsvr32.exe PID 2572 wrote to memory of 2620 2572 regsvr32.exe regsvr32.exe PID 2620 wrote to memory of 2844 2620 regsvr32.exe rundll32.exe PID 2620 wrote to memory of 2844 2620 regsvr32.exe rundll32.exe PID 2620 wrote to memory of 2844 2620 regsvr32.exe rundll32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2949a3d8bc89fb436b02ee417dd1230d9f3dc4fa1cc6364a6b900b61332e906f.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2949a3d8bc89fb436b02ee417dd1230d9f3dc4fa1cc6364a6b900b61332e906f.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\2949a3d8bc89fb436b02ee417dd1230d9f3dc4fa1cc6364a6b900b61332e906f.dll",DllRegisterServer3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2620-115-0x0000000002BB0000-0x0000000002BD8000-memory.dmpFilesize
160KB