Analysis
-
max time kernel
184s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 05:22
Static task
static1
Behavioral task
behavioral1
Sample
sljcdxac.dll
Resource
win7-20220715-en
General
-
Target
sljcdxac.dll
-
Size
904KB
-
MD5
18438898accea72967e5400222d00b2a
-
SHA1
6934ceb3ceff400ae8535bd904584834756ec77e
-
SHA256
27dd7c195b62f7505a6e2607c5a3202eee565a5cac5222fa9e2eb1e756246886
-
SHA512
42ab3a1f5545d238205070621e197c930d6885c094aaedde60519ceb4c8e7d1748f2bbd87dc69922ef5446196b7c0d91ae7873bac995337a3ad6642702056f46
Malware Config
Extracted
emotet
Epoch5
51.75.33.122:443
186.250.48.5:80
168.119.39.118:443
207.148.81.119:8080
194.9.172.107:8080
139.196.72.155:8080
78.47.204.80:443
159.69.237.188:443
45.71.195.104:8080
54.37.106.167:8080
185.168.130.138:443
37.44.244.177:8080
185.184.25.78:8080
185.148.168.15:8080
128.199.192.135:8080
37.59.209.141:8080
103.41.204.169:8080
185.148.168.220:8080
103.42.58.120:7080
78.46.73.125:443
68.183.93.250:443
190.90.233.66:443
5.56.132.177:8080
62.171.178.147:8080
196.44.98.190:8080
168.197.250.14:80
66.42.57.149:443
59.148.253.194:443
104.131.62.48:8080
191.252.103.16:80
54.37.228.122:443
88.217.172.165:8080
195.77.239.39:8080
116.124.128.206:8080
93.104.209.107:8080
118.98.72.86:443
217.182.143.207:443
87.106.97.83:7080
210.57.209.142:8080
54.38.242.185:443
195.154.146.35:443
203.153.216.46:443
198.199.98.78:8080
85.214.67.203:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4060 regsvr32.exe 4060 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 944 wrote to memory of 4060 944 regsvr32.exe 82 PID 944 wrote to memory of 4060 944 regsvr32.exe 82 PID 944 wrote to memory of 4060 944 regsvr32.exe 82