Analysis
-
max time kernel
4294181s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
06-03-2022 23:05
Behavioral task
behavioral1
Sample
6b14a533653d8535dc86e29deca21ba3266ab9088b2d7cf08cb96993136356cc.dll
Resource
win7-20220223-en
General
-
Target
6b14a533653d8535dc86e29deca21ba3266ab9088b2d7cf08cb96993136356cc.dll
-
Size
58KB
-
MD5
2969958cda104c3c7b8fa66e1dd94b75
-
SHA1
875ed549c0d9e6e1ae8bc3b49c7b04b01dd5fe35
-
SHA256
6b14a533653d8535dc86e29deca21ba3266ab9088b2d7cf08cb96993136356cc
-
SHA512
0484fff46ccbf55a69bc8bfc3bc1b1582992c15f7f288343128997b3dfbda18db1d0fe9648922537c1799990d74a52794a6411eb088334f388c909b237f768f7
Malware Config
Extracted
emotet
Epoch2
49.205.182.134:80
72.229.97.235:80
188.165.214.98:8080
185.201.9.197:8080
64.207.182.168:8080
5.39.91.110:7080
155.186.9.160:80
24.178.90.49:80
157.245.99.39:8080
174.118.202.24:443
50.246.154.69:80
79.137.83.50:443
110.145.11.73:80
190.29.166.0:80
176.111.60.55:8080
24.69.65.8:8080
46.105.131.79:8080
62.30.7.67:443
172.125.40.123:80
209.141.54.221:7080
37.139.21.175:8080
172.104.97.173:8080
185.94.252.104:443
58.1.242.115:80
220.245.198.194:80
74.128.121.17:80
89.216.122.92:80
202.141.243.254:443
110.145.77.103:80
94.23.237.171:443
202.134.4.211:8080
110.145.101.66:443
109.74.5.95:8080
137.59.187.107:8080
203.153.216.189:7080
108.21.72.56:443
172.86.188.251:8080
194.4.58.192:7080
100.37.240.62:80
85.105.111.166:80
104.131.11.150:443
120.150.218.241:443
121.124.124.40:7080
95.213.236.64:8080
161.0.153.60:80
186.74.215.34:80
200.116.145.225:443
120.150.60.189:80
74.40.205.197:443
187.161.206.24:80
41.185.28.84:8080
78.24.219.147:8080
167.114.153.111:8080
37.187.72.193:8080
138.68.87.218:443
50.91.114.38:80
67.10.155.92:80
109.116.245.80:80
87.106.139.101:8080
76.27.179.47:80
139.59.60.244:8080
119.59.116.21:8080
134.209.144.106:443
144.217.7.207:7080
74.75.104.224:80
95.9.5.93:80
142.112.10.95:20
202.134.4.216:8080
123.176.25.234:80
188.219.31.12:80
62.75.141.82:80
136.244.110.184:8080
115.94.207.99:443
181.165.68.127:80
72.188.173.74:80
139.99.158.11:443
61.19.246.238:443
75.143.247.51:80
118.83.154.64:443
51.89.36.180:443
152.170.205.73:80
2.58.16.89:8080
110.142.236.207:80
47.144.21.37:80
74.208.45.104:8080
181.171.209.241:443
190.240.194.77:443
208.74.26.234:80
190.146.92.48:80
217.20.166.178:7080
190.162.215.233:80
201.241.127.190:80
72.186.136.247:443
62.171.142.179:8080
139.162.60.124:8080
5.2.212.254:80
172.105.13.66:443
24.179.13.119:80
168.235.67.138:7080
50.245.107.73:443
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2016-55-0x00000000001A0000-0x00000000001B0000-memory.dmp emotet -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 2016 rundll32.exe 2016 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1152 wrote to memory of 2016 1152 rundll32.exe rundll32.exe PID 1152 wrote to memory of 2016 1152 rundll32.exe rundll32.exe PID 1152 wrote to memory of 2016 1152 rundll32.exe rundll32.exe PID 1152 wrote to memory of 2016 1152 rundll32.exe rundll32.exe PID 1152 wrote to memory of 2016 1152 rundll32.exe rundll32.exe PID 1152 wrote to memory of 2016 1152 rundll32.exe rundll32.exe PID 1152 wrote to memory of 2016 1152 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b14a533653d8535dc86e29deca21ba3266ab9088b2d7cf08cb96993136356cc.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b14a533653d8535dc86e29deca21ba3266ab9088b2d7cf08cb96993136356cc.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses