Analysis
-
max time kernel
83s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2023 18:46
Static task
static1
Behavioral task
behavioral1
Sample
945958b58306617cde346d9ed4f8c33c.dll
Resource
win7-20221111-en
General
-
Target
945958b58306617cde346d9ed4f8c33c.dll
-
Size
664KB
-
MD5
945958b58306617cde346d9ed4f8c33c
-
SHA1
cd25656822e24856692e3ab9c54ccfe18a334f7d
-
SHA256
ccb76fc936bef489d1a947e675ec9b3ea9800ddabf7a888c24f4386927a3daaf
-
SHA512
9e0c8e9cac1a808849de37d1fc6ca2d82a941eeaeb2772bea61a15429c889e1f798b53e30cf5911fbe846ee73345c79f8a104f2f84211a011883c069f7cec73a
-
SSDEEP
12288:aX5mvP53RTqtl79F7Unrymfxbm1nB0hoxxUI/:Ac53RTk5Oxi1B0hGxUI
Malware Config
Extracted
emotet
Epoch4
149.56.128.192:443
120.50.40.183:80
160.16.218.63:8080
217.182.25.250:8080
119.193.124.41:7080
103.75.201.2:443
195.201.151.129:8080
131.100.24.231:80
159.65.88.10:8080
1.234.21.73:7080
5.9.116.246:8080
103.75.201.4:443
176.104.106.96:8080
138.185.72.26:8080
212.237.17.99:8080
72.15.201.15:8080
103.43.46.182:443
207.38.84.195:8080
46.55.222.11:443
1.234.2.232:8080
101.50.0.91:8080
58.227.42.236:80
129.232.188.93:443
212.24.98.99:8080
158.69.222.101:443
51.254.140.238:7080
167.99.115.35:8080
197.242.150.244:8080
45.118.135.203:7080
50.30.40.196:8080
82.165.152.127:8080
103.221.221.247:8080
50.116.54.215:443
195.154.133.20:443
185.157.82.211:8080
45.176.232.124:443
176.56.128.118:443
107.182.225.142:8080
206.188.212.92:8080
45.142.114.231:8080
173.212.193.249:8080
153.126.146.25:7080
159.8.59.82:8080
31.24.158.56:8080
51.91.7.5:8080
164.68.99.3:8080
192.99.251.50:443
178.79.147.66:8080
110.232.117.186:8080
209.126.98.206:8080
188.44.20.25:443
216.158.226.206:443
146.59.226.45:443
45.118.115.99:8080
151.106.112.196:8080
79.172.212.216:8080
203.114.109.124:443
196.218.30.83:443
185.8.212.130:7080
189.126.111.200:7080
209.250.246.206:443
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 4700 regsvr32.exe 4700 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4348 wrote to memory of 4700 4348 regsvr32.exe regsvr32.exe PID 4348 wrote to memory of 4700 4348 regsvr32.exe regsvr32.exe PID 4348 wrote to memory of 4700 4348 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\945958b58306617cde346d9ed4f8c33c.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\945958b58306617cde346d9ed4f8c33c.dll2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700