Analysis
-
max time kernel
43s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-06-2022 18:23
Static task
static1
Behavioral task
behavioral1
Sample
1f05ec566501e25f0a7edb125f24a35a.dll
Resource
win7-20220414-en
General
-
Target
1f05ec566501e25f0a7edb125f24a35a.dll
-
Size
289KB
-
MD5
1f05ec566501e25f0a7edb125f24a35a
-
SHA1
1fccb30680f399863c501d8804ddc1af5e15d54b
-
SHA256
797a54dbca1f97bc5c2b21bf48bddb2a6ef149d1a1e21d3f0d1fd1e7e184a4d8
-
SHA512
e4d8c6a097b1c02a375d8d8d1d27127fcd30a4a6b47d48baec80dab5116685ecc21452860cc3725e14ed103dadb430c3b687638abaf4c69421cfe43017738ae9
Malware Config
Extracted
emotet
62.171.178.147:8080
128.199.217.206:443
85.25.120.45:8080
157.230.99.206:8080
46.101.234.246:8080
196.44.98.190:8080
202.134.4.210:7080
54.37.106.167:8080
175.126.176.79:8080
104.244.79.94:443
103.71.99.57:8080
88.217.172.165:8080
104.248.225.227:8080
198.199.70.22:8080
64.227.55.231:8080
128.199.242.164:8080
195.77.239.39:8080
118.98.72.86:443
54.37.228.122:443
157.245.111.0:8080
85.214.67.203:8080
37.187.114.15:8080
103.41.204.169:8080
46.101.98.60:8080
210.57.209.142:8080
188.225.32.231:4143
87.106.97.83:7080
103.85.95.4:8080
103.224.241.74:8080
190.145.8.4:443
165.22.254.236:8080
139.196.72.155:8080
202.28.34.99:8080
190.107.19.179:443
78.47.204.80:443
202.29.239.162:443
178.62.112.199:8080
103.254.12.236:7080
103.56.149.105:8080
36.67.23.59:443
93.104.209.107:8080
77.72.149.48:8080
68.183.91.111:8080
103.126.216.86:443
116.124.128.206:8080
37.44.244.177:8080
165.232.185.110:8080
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1652 regsvr32.exe 2028 regsvr32.exe 2028 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1652 regsvr32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2028 1652 regsvr32.exe 28 PID 1652 wrote to memory of 2028 1652 regsvr32.exe 28 PID 1652 wrote to memory of 2028 1652 regsvr32.exe 28 PID 1652 wrote to memory of 2028 1652 regsvr32.exe 28 PID 1652 wrote to memory of 2028 1652 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1f05ec566501e25f0a7edb125f24a35a.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\TtPlGXHz\vkKCyV.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-