Analysis
-
max time kernel
107s -
max time network
120s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-01-2022 20:29
Static task
static1
General
-
Target
3717e27c67932c4fbab02152081fe129c6c8c9eafa9a5ab9909f9094522ce573.dll
-
Size
408KB
-
MD5
b45e761378284d02581bf6e8e97f8df1
-
SHA1
6910b68d1a7f3c0c34746b2582a8a8f3e8e3f9c1
-
SHA256
3717e27c67932c4fbab02152081fe129c6c8c9eafa9a5ab9909f9094522ce573
-
SHA512
1a0681455172316999a0cbbf90897b99e34fc5b706993892470f3fcd30768ffe6f04a93a0286e00763074a51510b6f9d6b3ea253c8bf6d6a13e3ef079628b26e
Malware Config
Extracted
emotet
Epoch5
45.138.98.34:80
69.16.218.101:8080
51.210.242.234:8080
185.148.168.220:8080
142.4.219.173:8080
54.38.242.185:443
191.252.103.16:80
104.131.62.48:8080
62.171.178.147:8080
217.182.143.207:443
168.197.250.14:80
37.44.244.177:8080
66.42.57.149:443
210.57.209.142:8080
159.69.237.188:443
116.124.128.206:8080
128.199.192.135:8080
195.154.146.35:443
185.148.168.15:8080
195.77.239.39:8080
207.148.81.119:8080
85.214.67.203:8080
190.90.233.66:443
78.46.73.125:443
78.47.204.80:443
37.59.209.141:8080
54.37.228.122:443
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 860 wrote to memory of 3204 860 regsvr32.exe regsvr32.exe PID 860 wrote to memory of 3204 860 regsvr32.exe regsvr32.exe PID 860 wrote to memory of 3204 860 regsvr32.exe regsvr32.exe PID 3204 wrote to memory of 1304 3204 regsvr32.exe rundll32.exe PID 3204 wrote to memory of 1304 3204 regsvr32.exe rundll32.exe PID 3204 wrote to memory of 1304 3204 regsvr32.exe rundll32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3717e27c67932c4fbab02152081fe129c6c8c9eafa9a5ab9909f9094522ce573.dll1⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3717e27c67932c4fbab02152081fe129c6c8c9eafa9a5ab9909f9094522ce573.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\3717e27c67932c4fbab02152081fe129c6c8c9eafa9a5ab9909f9094522ce573.dll",DllRegisterServer3⤵PID:1304
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3204-117-0x0000000004840000-0x0000000004868000-memory.dmpFilesize
160KB