Analysis

  • max time kernel
    91s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-06-2022 16:22

General

  • Target

    ucjjnrpp.dll

  • Size

    608KB

  • MD5

    9a79cf9f3d181be0c7328ad7f43a2294

  • SHA1

    c9f1d68fbe86bd0f8ef7b5c74869a03eb5bffa1d

  • SHA256

    6d9928db2e64a0727d4c98a3ea74fca19306f30bb29beb3f7c2ae384a33f989b

  • SHA512

    facbc44058928e7e8f95a70e5e833c395f38ae8ab3177e139df1e03d41d67a784b039df428cb07ff0ca04f270e1a997c5903ee84c443fd8d372f341e400334f4

Malware Config

Extracted

Family

emotet

Botnet

Epoch5

C2

5.189.160.61:443

94.177.178.26:8080

202.29.239.162:443

54.38.143.246:7080

119.59.125.140:8080

185.148.168.15:8080

188.166.229.148:443

2.58.16.87:8080

104.131.62.48:8080

103.82.248.59:7080

37.59.209.141:8080

103.133.214.242:8080

195.77.239.39:8080

128.199.192.135:8080

78.47.204.80:443

59.148.253.194:443

87.106.97.83:7080

45.71.195.104:8080

85.214.67.203:8080

139.196.72.155:8080

eck1.plain
ecs1.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • suricata: ET MALWARE W32/Emotet CnC Beacon 3

    suricata: ET MALWARE W32/Emotet CnC Beacon 3

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ucjjnrpp.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\ucjjnrpp.dll
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4544

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4544-131-0x0000000000C20000-0x0000000000C43000-memory.dmp

    Filesize

    140KB