Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-04-2022 00:17
Static task
static1
Behavioral task
behavioral1
Sample
nmhopneh.dll
Resource
win7-20220414-en
General
-
Target
nmhopneh.dll
-
Size
348KB
-
MD5
dca3f0a3eecf16ac4b72615d712112e9
-
SHA1
909870e8ea76626fbe13e2c960560c2a165bd102
-
SHA256
b5abacf24ae5aa96016c09f71a78d0121fff396d6154740eab622c4751e1764f
-
SHA512
4bb8558e76f78b1078526952420789552930119fff8a8163d86e809186bcc7f2d2b78ee1475bc2d143648a1e890da841f0dd24704a3a1b93783b686cd95dd510
Malware Config
Extracted
emotet
Epoch1
181.10.46.92:80
2.58.16.88:8080
206.189.232.2:8080
178.250.54.208:8080
167.71.148.58:443
202.134.4.210:7080
187.162.248.237:80
78.206.229.130:80
85.214.26.7:8080
5.196.35.138:7080
1.226.84.243:8080
110.39.162.2:443
185.183.16.47:80
152.231.89.226:80
138.97.60.141:7080
94.176.234.118:443
46.101.58.37:8080
93.146.143.191:80
70.32.84.74:8080
137.74.106.111:7080
80.15.100.37:80
68.183.190.199:8080
154.127.113.242:80
70.32.115.157:8080
12.163.208.58:80
31.27.59.105:80
110.39.160.38:443
68.183.170.114:8080
87.106.46.107:8080
105.209.235.113:8080
185.94.252.27:443
209.236.123.42:8080
60.93.23.51:80
186.177.174.163:80
177.85.167.10:80
111.67.12.221:8080
191.241.233.198:80
149.202.72.142:7080
12.162.84.2:8080
217.13.106.14:8080
197.232.36.108:80
192.232.229.53:4143
143.0.85.206:7080
177.23.7.151:80
213.52.74.198:80
51.255.165.160:8080
181.30.61.163:443
93.149.120.214:80
212.71.237.140:8080
51.15.7.145:80
190.247.139.101:80
188.135.15.49:80
155.186.9.160:80
91.233.197.70:80
95.76.153.115:80
46.43.2.95:8080
152.169.22.67:80
138.197.99.250:8080
104.131.41.185:8080
211.215.18.93:8080
81.215.230.173:443
152.170.79.100:80
190.114.254.163:8080
190.251.216.100:80
201.241.127.190:80
82.208.146.142:7080
172.245.248.239:8080
190.64.88.186:443
192.175.111.212:7080
50.28.51.143:8080
81.17.93.134:80
202.79.24.136:443
190.24.243.186:80
190.162.232.138:80
62.84.75.50:80
190.210.246.253:80
190.45.24.210:80
172.104.169.32:8080
82.48.39.246:80
188.225.32.231:7080
45.16.226.117:443
178.211.45.66:8080
138.97.60.140:8080
122.201.23.45:443
170.81.48.2:80
81.214.253.80:443
80.249.176.206:80
83.169.21.32:7080
46.105.114.137:8080
83.144.109.70:80
191.223.36.170:80
200.75.39.254:80
201.185.69.28:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 22 5084 rundll32.exe 30 5084 rundll32.exe 35 5084 rundll32.exe 37 5084 rundll32.exe 38 5084 rundll32.exe 40 5084 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 4136 rundll32.exe 5084 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Qxuiam\mrdwg.ocz rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe 5084 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5112 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4732 wrote to memory of 5112 4732 rundll32.exe 83 PID 4732 wrote to memory of 5112 4732 rundll32.exe 83 PID 4732 wrote to memory of 5112 4732 rundll32.exe 83 PID 5112 wrote to memory of 4136 5112 rundll32.exe 85 PID 5112 wrote to memory of 4136 5112 rundll32.exe 85 PID 5112 wrote to memory of 4136 5112 rundll32.exe 85 PID 4136 wrote to memory of 5084 4136 rundll32.exe 86 PID 4136 wrote to memory of 5084 4136 rundll32.exe 86 PID 4136 wrote to memory of 5084 4136 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\nmhopneh.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\nmhopneh.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qxuiam\mrdwg.ocz",hoPSoybeANkMH3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Qxuiam\mrdwg.ocz",#14⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD5dca3f0a3eecf16ac4b72615d712112e9
SHA1909870e8ea76626fbe13e2c960560c2a165bd102
SHA256b5abacf24ae5aa96016c09f71a78d0121fff396d6154740eab622c4751e1764f
SHA5124bb8558e76f78b1078526952420789552930119fff8a8163d86e809186bcc7f2d2b78ee1475bc2d143648a1e890da841f0dd24704a3a1b93783b686cd95dd510
-
Filesize
348KB
MD5dca3f0a3eecf16ac4b72615d712112e9
SHA1909870e8ea76626fbe13e2c960560c2a165bd102
SHA256b5abacf24ae5aa96016c09f71a78d0121fff396d6154740eab622c4751e1764f
SHA5124bb8558e76f78b1078526952420789552930119fff8a8163d86e809186bcc7f2d2b78ee1475bc2d143648a1e890da841f0dd24704a3a1b93783b686cd95dd510