Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2023 09:55
Static task
static1
Behavioral task
behavioral1
Sample
5606f22b9eaf1690e284355551c0ed514b27d18216be1afd2aa372b28317003d.dll
Resource
win7-20220812-en
General
-
Target
5606f22b9eaf1690e284355551c0ed514b27d18216be1afd2aa372b28317003d.dll
-
Size
805KB
-
MD5
4b5b064eedb7a52b11a947439643359c
-
SHA1
6f9882c8180e2d04f95466ad56f90aae4e6dc060
-
SHA256
5606f22b9eaf1690e284355551c0ed514b27d18216be1afd2aa372b28317003d
-
SHA512
7a785e9aac036eb7f60a6d761813f7ddc1e12f03dfa764bb8f7c0fa6180d9377802ca7bdc7102111f92cbff8955b46e4da7b189ff8fa15ec3d4df81227fc46f8
-
SSDEEP
12288:zuZ0VaBZTXdQfRTBZP0SBK6DjNN6+Yyd9gHg8zUXv31K5poRoMJUHUjPbs:wdKsxejNNZbug8o+2
Malware Config
Extracted
emotet
Epoch5
186.250.48.5:80
168.119.39.118:443
185.168.130.138:443
190.90.233.66:443
159.69.237.188:443
54.37.228.122:443
93.104.209.107:8080
185.148.168.15:8080
198.199.98.78:8080
87.106.97.83:7080
195.77.239.39:8080
37.44.244.177:8080
54.38.242.185:443
185.184.25.78:8080
116.124.128.206:8080
139.196.72.155:8080
128.199.192.135:8080
103.41.204.169:8080
78.47.204.80:443
68.183.93.250:443
194.9.172.107:8080
37.59.209.141:8080
85.214.67.203:8080
78.46.73.125:443
195.154.146.35:443
191.252.103.16:80
118.98.72.86:443
185.148.168.220:8080
217.182.143.207:443
168.197.250.14:80
62.171.178.147:8080
104.131.62.48:8080
203.153.216.46:443
210.57.209.142:8080
59.148.253.194:443
207.148.81.119:8080
54.37.106.167:8080
66.42.57.149:443
45.71.195.104:8080
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4288 regsvr32.exe -
Drops file in System32 directory 1 IoCs
Processes:
regsvr32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Hgusjhpnna\dggjwz.yns regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 4288 regsvr32.exe 4288 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 4616 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 372 wrote to memory of 4616 372 regsvr32.exe regsvr32.exe PID 372 wrote to memory of 4616 372 regsvr32.exe regsvr32.exe PID 372 wrote to memory of 4616 372 regsvr32.exe regsvr32.exe PID 4616 wrote to memory of 4288 4616 regsvr32.exe regsvr32.exe PID 4616 wrote to memory of 4288 4616 regsvr32.exe regsvr32.exe PID 4616 wrote to memory of 4288 4616 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5606f22b9eaf1690e284355551c0ed514b27d18216be1afd2aa372b28317003d.dll1⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5606f22b9eaf1690e284355551c0ed514b27d18216be1afd2aa372b28317003d.dll2⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Hgusjhpnna\dggjwz.yns"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD54b5b064eedb7a52b11a947439643359c
SHA16f9882c8180e2d04f95466ad56f90aae4e6dc060
SHA2565606f22b9eaf1690e284355551c0ed514b27d18216be1afd2aa372b28317003d
SHA5127a785e9aac036eb7f60a6d761813f7ddc1e12f03dfa764bb8f7c0fa6180d9377802ca7bdc7102111f92cbff8955b46e4da7b189ff8fa15ec3d4df81227fc46f8