Analysis
-
max time kernel
160s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-06-2022 05:59
Static task
static1
Behavioral task
behavioral1
Sample
rubrsmqq.dll
Resource
win7-20220414-en
General
-
Target
rubrsmqq.dll
-
Size
580KB
-
MD5
731211666ede37a6bc51f90c8469ba2b
-
SHA1
4a59ef1f0e0a3383837500a7319e9cf2706c22e7
-
SHA256
62b05ad0159b7cfb3108236411b84bb3153f9468939062a591f6b83181098cd1
-
SHA512
2cb5579cd1bad58d2abb1fa61515159ed76ba92eacc66bc8aeae847f3421cc5fd4c401e5442b3f5a8b5430f5710c413ccacd3353558ab9b76b50c2d8f9e08c7d
Malware Config
Extracted
emotet
Epoch4
164.68.99.3:8080
146.59.226.45:443
51.91.76.89:8080
209.97.163.214:443
158.69.222.101:443
82.165.152.127:8080
103.70.28.102:8080
72.15.201.15:8080
150.95.66.124:8080
45.176.232.124:443
82.223.21.224:8080
107.170.39.149:8080
160.16.142.56:8080
103.132.242.26:8080
153.126.146.25:7080
213.241.20.155:443
1.234.21.73:7080
197.242.150.244:8080
188.44.20.25:443
196.218.30.83:443
5.9.116.246:8080
183.111.227.137:8080
173.212.193.249:8080
207.180.241.186:8080
201.94.166.162:443
212.24.98.99:8080
115.68.227.76:8080
206.189.28.199:8080
203.114.109.124:443
103.43.75.120:443
149.56.131.28:8080
110.232.117.186:8080
103.75.201.2:443
46.55.222.11:443
209.126.98.206:8080
1.234.2.232:8080
45.118.115.99:8080
163.44.196.120:8080
119.193.124.41:7080
151.106.112.196:8080
101.50.0.91:8080
51.254.140.238:7080
186.194.240.217:443
172.104.251.154:8080
91.207.28.33:8080
159.65.88.10:8080
185.4.135.165:8080
79.137.35.198:8080
159.89.202.34:443
129.232.188.93:443
131.100.24.231:80
41.73.252.195:443
134.122.66.193:8080
37.187.115.122:8080
94.23.45.86:4143
167.172.253.162:8080
159.65.140.115:443
45.235.8.30:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1616 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1616 regsvr32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1764 1616 regsvr32.exe 28 PID 1616 wrote to memory of 1764 1616 regsvr32.exe 28 PID 1616 wrote to memory of 1764 1616 regsvr32.exe 28 PID 1616 wrote to memory of 1764 1616 regsvr32.exe 28 PID 1616 wrote to memory of 1764 1616 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\rubrsmqq.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\QrpVEGAOwiP\yhuyE.dll"2⤵PID:1764
-