Analysis
-
max time kernel
156s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 04:19
Static task
static1
Behavioral task
behavioral1
Sample
ffhovtly.dll
Resource
win7-20220414-en
General
-
Target
ffhovtly.dll
-
Size
904KB
-
MD5
18438898accea72967e5400222d00b2a
-
SHA1
6934ceb3ceff400ae8535bd904584834756ec77e
-
SHA256
27dd7c195b62f7505a6e2607c5a3202eee565a5cac5222fa9e2eb1e756246886
-
SHA512
42ab3a1f5545d238205070621e197c930d6885c094aaedde60519ceb4c8e7d1748f2bbd87dc69922ef5446196b7c0d91ae7873bac995337a3ad6642702056f46
Malware Config
Extracted
emotet
Epoch5
51.75.33.122:443
186.250.48.5:80
168.119.39.118:443
207.148.81.119:8080
194.9.172.107:8080
139.196.72.155:8080
78.47.204.80:443
159.69.237.188:443
45.71.195.104:8080
54.37.106.167:8080
185.168.130.138:443
37.44.244.177:8080
185.184.25.78:8080
185.148.168.15:8080
128.199.192.135:8080
37.59.209.141:8080
103.41.204.169:8080
185.148.168.220:8080
103.42.58.120:7080
78.46.73.125:443
68.183.93.250:443
190.90.233.66:443
5.56.132.177:8080
62.171.178.147:8080
196.44.98.190:8080
168.197.250.14:80
66.42.57.149:443
59.148.253.194:443
104.131.62.48:8080
191.252.103.16:80
54.37.228.122:443
88.217.172.165:8080
195.77.239.39:8080
116.124.128.206:8080
93.104.209.107:8080
118.98.72.86:443
217.182.143.207:443
87.106.97.83:7080
210.57.209.142:8080
54.38.242.185:443
195.154.146.35:443
203.153.216.46:443
198.199.98.78:8080
85.214.67.203:8080
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1388 regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Oetpgxjfgclyilji\lowdx.odg regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1388 regsvr32.exe 1388 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2260 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2260 4980 regsvr32.exe 79 PID 4980 wrote to memory of 2260 4980 regsvr32.exe 79 PID 4980 wrote to memory of 2260 4980 regsvr32.exe 79 PID 2260 wrote to memory of 1388 2260 regsvr32.exe 80 PID 2260 wrote to memory of 1388 2260 regsvr32.exe 80 PID 2260 wrote to memory of 1388 2260 regsvr32.exe 80
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ffhovtly.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ffhovtly.dll2⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Oetpgxjfgclyilji\lowdx.odg"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1388
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD518438898accea72967e5400222d00b2a
SHA16934ceb3ceff400ae8535bd904584834756ec77e
SHA25627dd7c195b62f7505a6e2607c5a3202eee565a5cac5222fa9e2eb1e756246886
SHA51242ab3a1f5545d238205070621e197c930d6885c094aaedde60519ceb4c8e7d1748f2bbd87dc69922ef5446196b7c0d91ae7873bac995337a3ad6642702056f46