Analysis
-
max time kernel
148s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 04:19
Static task
static1
Behavioral task
behavioral1
Sample
ffhovtly.dll
Resource
win7-20220414-en
General
-
Target
ffhovtly.dll
-
Size
904KB
-
MD5
18438898accea72967e5400222d00b2a
-
SHA1
6934ceb3ceff400ae8535bd904584834756ec77e
-
SHA256
27dd7c195b62f7505a6e2607c5a3202eee565a5cac5222fa9e2eb1e756246886
-
SHA512
42ab3a1f5545d238205070621e197c930d6885c094aaedde60519ceb4c8e7d1748f2bbd87dc69922ef5446196b7c0d91ae7873bac995337a3ad6642702056f46
Malware Config
Extracted
emotet
Epoch5
51.75.33.122:443
186.250.48.5:80
168.119.39.118:443
207.148.81.119:8080
194.9.172.107:8080
139.196.72.155:8080
78.47.204.80:443
159.69.237.188:443
45.71.195.104:8080
54.37.106.167:8080
185.168.130.138:443
37.44.244.177:8080
185.184.25.78:8080
185.148.168.15:8080
128.199.192.135:8080
37.59.209.141:8080
103.41.204.169:8080
185.148.168.220:8080
103.42.58.120:7080
78.46.73.125:443
68.183.93.250:443
190.90.233.66:443
5.56.132.177:8080
62.171.178.147:8080
196.44.98.190:8080
168.197.250.14:80
66.42.57.149:443
59.148.253.194:443
104.131.62.48:8080
191.252.103.16:80
54.37.228.122:443
88.217.172.165:8080
195.77.239.39:8080
116.124.128.206:8080
93.104.209.107:8080
118.98.72.86:443
217.182.143.207:443
87.106.97.83:7080
210.57.209.142:8080
54.38.242.185:443
195.154.146.35:443
203.153.216.46:443
198.199.98.78:8080
85.214.67.203:8080
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Jqkxitbpkyxeca\hzflyalhswxxgx.znl regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1032 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1104 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1104 1364 regsvr32.exe 28 PID 1364 wrote to memory of 1104 1364 regsvr32.exe 28 PID 1364 wrote to memory of 1104 1364 regsvr32.exe 28 PID 1364 wrote to memory of 1104 1364 regsvr32.exe 28 PID 1364 wrote to memory of 1104 1364 regsvr32.exe 28 PID 1364 wrote to memory of 1104 1364 regsvr32.exe 28 PID 1364 wrote to memory of 1104 1364 regsvr32.exe 28 PID 1104 wrote to memory of 1032 1104 regsvr32.exe 29 PID 1104 wrote to memory of 1032 1104 regsvr32.exe 29 PID 1104 wrote to memory of 1032 1104 regsvr32.exe 29 PID 1104 wrote to memory of 1032 1104 regsvr32.exe 29 PID 1104 wrote to memory of 1032 1104 regsvr32.exe 29 PID 1104 wrote to memory of 1032 1104 regsvr32.exe 29 PID 1104 wrote to memory of 1032 1104 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ffhovtly.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ffhovtly.dll2⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Jqkxitbpkyxeca\hzflyalhswxxgx.znl"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-