Analysis
-
max time kernel
125s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
23-03-2022 08:22
Static task
static1
Behavioral task
behavioral1
Sample
fc963f180da0d48225058e70aecfff6f.dll
Resource
win7-20220311-en
General
-
Target
fc963f180da0d48225058e70aecfff6f.dll
-
Size
840KB
-
MD5
fc963f180da0d48225058e70aecfff6f
-
SHA1
d1fb274e0e45139d72248338557af64c66ffe47a
-
SHA256
9ec2c005130746d418ef6a5f8042c31664c660e91c7a9e495e9702225e1ef0d3
-
SHA512
ec5e07654319aee348dd95aa9e0730a7328c5ab9fbf809df8562f4b962ead3c70d6e9ff8dff0479cd6332daf9d9726611eddeec6466fc41b3216f115c347b179
Malware Config
Extracted
emotet
Epoch5
202.29.239.162:443
54.38.143.246:7080
1.234.65.61:7080
202.134.4.210:7080
59.148.253.194:443
78.46.73.125:443
210.57.209.142:8080
198.199.98.78:8080
93.104.209.107:8080
116.124.128.206:8080
139.196.72.155:8080
188.166.229.148:443
119.59.125.140:8080
195.77.239.39:8080
78.47.204.80:443
196.44.98.190:8080
36.67.23.59:443
185.148.168.15:8080
37.59.209.141:8080
2.58.16.87:8080
85.25.120.45:8080
103.82.248.59:7080
54.38.242.185:443
207.148.81.119:8080
62.171.178.147:8080
203.153.216.46:443
194.9.172.107:8080
87.106.97.83:7080
195.154.146.35:443
45.71.195.104:8080
104.131.62.48:8080
103.133.214.242:8080
37.44.244.177:8080
5.56.132.177:8080
128.199.192.135:8080
190.90.233.66:443
66.42.57.149:443
103.42.58.120:7080
217.182.143.207:443
54.37.228.122:443
85.214.67.203:8080
159.69.237.188:443
185.148.168.220:8080
191.252.103.16:80
118.98.72.86:443
68.183.93.250:443
103.41.204.169:8080
88.217.172.165:8080
202.28.34.99:8080
54.37.106.167:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4400 regsvr32.exe 4400 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4400 4636 regsvr32.exe 82 PID 4636 wrote to memory of 4400 4636 regsvr32.exe 82 PID 4636 wrote to memory of 4400 4636 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fc963f180da0d48225058e70aecfff6f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\fc963f180da0d48225058e70aecfff6f.dll2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-