Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
ec5994b78ec3837eac38e35501dc98db.dll
Resource
win7-20221111-en
General
-
Target
ec5994b78ec3837eac38e35501dc98db.dll
-
Size
611KB
-
MD5
ec5994b78ec3837eac38e35501dc98db
-
SHA1
7477781b804221800c03498cf7349c3bfff9b50c
-
SHA256
c51b13f52af8a5e9cf59ebabd2487b9e522bb135a3d607f7f459ccf15692b3c1
-
SHA512
258e16f7456c993e5fe08d90fa22ab182a6ffa0f1bd43f9565f0dd2f110f727ae1c05f82500a44cac04f0257d9c92cec8aa55ba1c90351fddd614bf726a5a3af
-
SSDEEP
12288:J1U8sNY8/z0rYebzwdRCoGEAbcVBLku8w:oq6z0rYcMdRVGEZBLkuF
Malware Config
Extracted
emotet
Epoch5
186.250.48.5:80
168.119.39.118:443
185.168.130.138:443
190.90.233.66:443
159.69.237.188:443
54.37.228.122:443
93.104.209.107:8080
185.148.168.15:8080
198.199.98.78:8080
87.106.97.83:7080
195.77.239.39:8080
37.44.244.177:8080
54.38.242.185:443
185.184.25.78:8080
116.124.128.206:8080
139.196.72.155:8080
128.199.192.135:8080
103.41.204.169:8080
78.47.204.80:443
68.183.93.250:443
194.9.172.107:8080
37.59.209.141:8080
85.214.67.203:8080
78.46.73.125:443
195.154.146.35:443
191.252.103.16:80
118.98.72.86:443
185.148.168.220:8080
217.182.143.207:443
168.197.250.14:80
62.171.178.147:8080
104.131.62.48:8080
203.153.216.46:443
210.57.209.142:8080
59.148.253.194:443
207.148.81.119:8080
54.37.106.167:8080
66.42.57.149:443
45.71.195.104:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1604 regsvr32.exe 1604 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 812 wrote to memory of 1604 812 regsvr32.exe regsvr32.exe PID 812 wrote to memory of 1604 812 regsvr32.exe regsvr32.exe PID 812 wrote to memory of 1604 812 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ec5994b78ec3837eac38e35501dc98db.dll1⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ec5994b78ec3837eac38e35501dc98db.dll2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-