Analysis
-
max time kernel
4294181s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
23-03-2022 08:22
Static task
static1
Behavioral task
behavioral1
Sample
fc963f180da0d48225058e70aecfff6f.dll
Resource
win7-20220311-en
General
-
Target
fc963f180da0d48225058e70aecfff6f.dll
-
Size
840KB
-
MD5
fc963f180da0d48225058e70aecfff6f
-
SHA1
d1fb274e0e45139d72248338557af64c66ffe47a
-
SHA256
9ec2c005130746d418ef6a5f8042c31664c660e91c7a9e495e9702225e1ef0d3
-
SHA512
ec5e07654319aee348dd95aa9e0730a7328c5ab9fbf809df8562f4b962ead3c70d6e9ff8dff0479cd6332daf9d9726611eddeec6466fc41b3216f115c347b179
Malware Config
Extracted
emotet
Epoch5
202.29.239.162:443
54.38.143.246:7080
1.234.65.61:7080
202.134.4.210:7080
59.148.253.194:443
78.46.73.125:443
210.57.209.142:8080
198.199.98.78:8080
93.104.209.107:8080
116.124.128.206:8080
139.196.72.155:8080
188.166.229.148:443
119.59.125.140:8080
195.77.239.39:8080
78.47.204.80:443
196.44.98.190:8080
36.67.23.59:443
185.148.168.15:8080
37.59.209.141:8080
2.58.16.87:8080
85.25.120.45:8080
103.82.248.59:7080
54.38.242.185:443
207.148.81.119:8080
62.171.178.147:8080
203.153.216.46:443
194.9.172.107:8080
87.106.97.83:7080
195.154.146.35:443
45.71.195.104:8080
104.131.62.48:8080
103.133.214.242:8080
37.44.244.177:8080
5.56.132.177:8080
128.199.192.135:8080
190.90.233.66:443
66.42.57.149:443
103.42.58.120:7080
217.182.143.207:443
54.37.228.122:443
85.214.67.203:8080
159.69.237.188:443
185.148.168.220:8080
191.252.103.16:80
118.98.72.86:443
68.183.93.250:443
103.41.204.169:8080
88.217.172.165:8080
202.28.34.99:8080
54.37.106.167:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 580 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1216 wrote to memory of 580 1216 regsvr32.exe 27 PID 1216 wrote to memory of 580 1216 regsvr32.exe 27 PID 1216 wrote to memory of 580 1216 regsvr32.exe 27 PID 1216 wrote to memory of 580 1216 regsvr32.exe 27 PID 1216 wrote to memory of 580 1216 regsvr32.exe 27 PID 1216 wrote to memory of 580 1216 regsvr32.exe 27 PID 1216 wrote to memory of 580 1216 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fc963f180da0d48225058e70aecfff6f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\fc963f180da0d48225058e70aecfff6f.dll2⤵
- Suspicious behavior: EnumeratesProcesses
PID:580
-