Analysis
-
max time kernel
42s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-06-2022 05:36
Static task
static1
Behavioral task
behavioral1
Sample
hpchmqmt.dll
Resource
win7-20220414-en
General
-
Target
hpchmqmt.dll
-
Size
518KB
-
MD5
b38d88e3af1b47c90358f3a47f90a3db
-
SHA1
143478e2d859486522db651777ed6cfba1c2d5c8
-
SHA256
cd54167bf79900d2875cbd985d19fe4016bbb5af517280e9d705bdb885bd2300
-
SHA512
9ac499034d3e6211c24854bc91dc4c65976c36de0843c7e94118b153fce00c105c5c634f5c4f42d48908c7930d826f7f4d11be09fae1b96968e9722cdb81f3bc
Malware Config
Extracted
emotet
Epoch4
149.56.131.28:8080
72.15.201.15:8080
207.148.79.14:8080
82.165.152.127:8080
46.55.222.11:443
213.241.20.155:443
163.44.196.120:8080
51.254.140.238:7080
107.170.39.149:8080
188.44.20.25:443
82.223.21.224:8080
172.104.251.154:8080
164.68.99.3:8080
101.50.0.91:8080
129.232.188.93:443
173.212.193.249:8080
103.132.242.26:8080
186.194.240.217:443
37.187.115.122:8080
91.207.28.33:8080
134.122.66.193:8080
1.234.2.232:8080
103.75.201.2:443
196.218.30.83:443
5.9.116.246:8080
103.70.28.102:8080
41.73.252.195:443
158.69.222.101:443
209.97.163.214:443
185.4.135.165:8080
115.68.227.76:8080
203.114.109.124:443
159.65.140.115:443
110.232.117.186:8080
51.91.76.89:8080
64.227.100.222:8080
150.95.66.124:8080
209.126.98.206:8080
153.126.146.25:7080
45.186.16.18:443
131.100.24.231:80
146.59.226.45:443
160.16.142.56:8080
167.172.253.162:8080
183.111.227.137:8080
119.193.124.41:7080
45.118.115.99:8080
159.89.202.34:443
51.161.73.194:443
212.24.98.99:8080
45.176.232.124:443
206.189.28.199:8080
197.242.150.244:8080
103.43.75.120:443
201.94.166.162:443
151.106.112.196:8080
157.245.196.132:443
159.65.88.10:8080
94.23.45.86:4143
79.137.35.198:8080
1.234.21.73:7080
45.235.8.30:8080
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1000 regsvr32.exe 1524 regsvr32.exe 1524 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1000 regsvr32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1000 wrote to memory of 1524 1000 regsvr32.exe 27 PID 1000 wrote to memory of 1524 1000 regsvr32.exe 27 PID 1000 wrote to memory of 1524 1000 regsvr32.exe 27 PID 1000 wrote to memory of 1524 1000 regsvr32.exe 27 PID 1000 wrote to memory of 1524 1000 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\hpchmqmt.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\IALhVaiYuYhCxw\mTPW.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-