Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
18-01-2022 20:29
Static task
static1
Behavioral task
behavioral1
Sample
emotet_exe_e5_619b42d29c05ab97f51996ae88e96296063850ad2ceaa1fb9d99b64b488bda05_2022-01-18__202829.exe.dll
Resource
win7-en-20211208
General
-
Target
emotet_exe_e5_619b42d29c05ab97f51996ae88e96296063850ad2ceaa1fb9d99b64b488bda05_2022-01-18__202829.exe.dll
-
Size
408KB
-
MD5
6fb488b84c304232c06311b44d63d078
-
SHA1
442213bf7c30dba1ce2754705d80c68cb620a578
-
SHA256
619b42d29c05ab97f51996ae88e96296063850ad2ceaa1fb9d99b64b488bda05
-
SHA512
360f3aa4cc30065f3a4adee4dec1dae64ed79d4c8fb7ebaeb06ad0417ffc339a0169ae0f18a686def6efa0f1e24ca0fdec4f43b468be974e3149ebc49d0b8096
Malware Config
Extracted
emotet
Epoch5
45.138.98.34:80
69.16.218.101:8080
51.210.242.234:8080
185.148.168.220:8080
142.4.219.173:8080
54.38.242.185:443
191.252.103.16:80
104.131.62.48:8080
62.171.178.147:8080
217.182.143.207:443
168.197.250.14:80
37.44.244.177:8080
66.42.57.149:443
210.57.209.142:8080
159.69.237.188:443
116.124.128.206:8080
128.199.192.135:8080
195.154.146.35:443
185.148.168.15:8080
195.77.239.39:8080
207.148.81.119:8080
85.214.67.203:8080
190.90.233.66:443
78.46.73.125:443
78.47.204.80:443
37.59.209.141:8080
54.37.228.122:443
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1012 wrote to memory of 1180 1012 regsvr32.exe regsvr32.exe PID 1012 wrote to memory of 1180 1012 regsvr32.exe regsvr32.exe PID 1012 wrote to memory of 1180 1012 regsvr32.exe regsvr32.exe PID 1180 wrote to memory of 3956 1180 regsvr32.exe rundll32.exe PID 1180 wrote to memory of 3956 1180 regsvr32.exe rundll32.exe PID 1180 wrote to memory of 3956 1180 regsvr32.exe rundll32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\emotet_exe_e5_619b42d29c05ab97f51996ae88e96296063850ad2ceaa1fb9d99b64b488bda05_2022-01-18__202829.exe.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\emotet_exe_e5_619b42d29c05ab97f51996ae88e96296063850ad2ceaa1fb9d99b64b488bda05_2022-01-18__202829.exe.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\emotet_exe_e5_619b42d29c05ab97f51996ae88e96296063850ad2ceaa1fb9d99b64b488bda05_2022-01-18__202829.exe.dll",DllRegisterServer3⤵PID:3956
-
-