Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2023 09:55
Static task
static1
Behavioral task
behavioral1
Sample
c51b13f52af8a5e9cf59ebabd2487b9e522bb135a3d607f7f459ccf15692b3c1.dll
Resource
win7-20220812-en
General
-
Target
c51b13f52af8a5e9cf59ebabd2487b9e522bb135a3d607f7f459ccf15692b3c1.dll
-
Size
611KB
-
MD5
ec5994b78ec3837eac38e35501dc98db
-
SHA1
7477781b804221800c03498cf7349c3bfff9b50c
-
SHA256
c51b13f52af8a5e9cf59ebabd2487b9e522bb135a3d607f7f459ccf15692b3c1
-
SHA512
258e16f7456c993e5fe08d90fa22ab182a6ffa0f1bd43f9565f0dd2f110f727ae1c05f82500a44cac04f0257d9c92cec8aa55ba1c90351fddd614bf726a5a3af
-
SSDEEP
12288:J1U8sNY8/z0rYebzwdRCoGEAbcVBLku8w:oq6z0rYcMdRVGEZBLkuF
Malware Config
Extracted
emotet
Epoch5
186.250.48.5:80
168.119.39.118:443
185.168.130.138:443
190.90.233.66:443
159.69.237.188:443
54.37.228.122:443
93.104.209.107:8080
185.148.168.15:8080
198.199.98.78:8080
87.106.97.83:7080
195.77.239.39:8080
37.44.244.177:8080
54.38.242.185:443
185.184.25.78:8080
116.124.128.206:8080
139.196.72.155:8080
128.199.192.135:8080
103.41.204.169:8080
78.47.204.80:443
68.183.93.250:443
194.9.172.107:8080
37.59.209.141:8080
85.214.67.203:8080
78.46.73.125:443
195.154.146.35:443
191.252.103.16:80
118.98.72.86:443
185.148.168.220:8080
217.182.143.207:443
168.197.250.14:80
62.171.178.147:8080
104.131.62.48:8080
203.153.216.46:443
210.57.209.142:8080
59.148.253.194:443
207.148.81.119:8080
54.37.106.167:8080
66.42.57.149:443
45.71.195.104:8080
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 2532 regsvr32.exe -
Drops file in System32 directory 1 IoCs
Processes:
regsvr32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Arlczfcjlqctgc\huvrkiljlcyaitq.gst regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2532 regsvr32.exe 2532 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 4760 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 4248 wrote to memory of 4760 4248 regsvr32.exe regsvr32.exe PID 4248 wrote to memory of 4760 4248 regsvr32.exe regsvr32.exe PID 4248 wrote to memory of 4760 4248 regsvr32.exe regsvr32.exe PID 4760 wrote to memory of 2532 4760 regsvr32.exe regsvr32.exe PID 4760 wrote to memory of 2532 4760 regsvr32.exe regsvr32.exe PID 4760 wrote to memory of 2532 4760 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c51b13f52af8a5e9cf59ebabd2487b9e522bb135a3d607f7f459ccf15692b3c1.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c51b13f52af8a5e9cf59ebabd2487b9e522bb135a3d607f7f459ccf15692b3c1.dll2⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Arlczfcjlqctgc\huvrkiljlcyaitq.gst"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
611KB
MD5ec5994b78ec3837eac38e35501dc98db
SHA17477781b804221800c03498cf7349c3bfff9b50c
SHA256c51b13f52af8a5e9cf59ebabd2487b9e522bb135a3d607f7f459ccf15692b3c1
SHA512258e16f7456c993e5fe08d90fa22ab182a6ffa0f1bd43f9565f0dd2f110f727ae1c05f82500a44cac04f0257d9c92cec8aa55ba1c90351fddd614bf726a5a3af