Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-03-2023 10:21
Static task
static1
Behavioral task
behavioral1
Sample
crGw6bNNNweuGlL07he.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
crGw6bNNNweuGlL07he.dll
Resource
win10v2004-20230220-en
General
-
Target
crGw6bNNNweuGlL07he.dll
-
Size
523.5MB
-
MD5
0650c03256eeaaa94e3c34546c35ad51
-
SHA1
a34a1e8ccd87c1a7c4b5c2941438fe8691cbe6d9
-
SHA256
7edb4423d8deb5a9ed72bf6977a31f1cbeb6bdde8512b3650cfcea96ee5b7a53
-
SHA512
d1217c4b26ff372072366a3ddbee9fa77c762d7a852e6a913ec1b214701708f72170bb68015f4ebca283530a6dc562eb327b3d7883041b6b72a60c4183abfab5
-
SSDEEP
6144:ZS+strpYZOLnN6zBiWmLcipbxTV5bEgWrhTmi3ve2vof2PPMIf39yeuLcLwdi:ZbapYTiDcidxTJUdpe2vofQMIfUb
Malware Config
Extracted
emotet
Epoch4
164.68.99.3:8080
164.90.222.65:443
186.194.240.217:443
1.234.2.232:8080
103.75.201.2:443
187.63.160.88:80
147.139.166.154:8080
91.207.28.33:8080
5.135.159.50:443
153.92.5.27:8080
213.239.212.5:443
103.43.75.120:443
159.65.88.10:8080
167.172.253.162:8080
153.126.146.25:7080
119.59.103.152:8080
107.170.39.149:8080
183.111.227.137:8080
159.89.202.34:443
110.232.117.186:8080
129.232.188.93:443
172.105.226.75:8080
197.242.150.244:8080
188.44.20.25:443
66.228.32.31:7080
91.121.146.47:8080
202.129.205.3:8080
45.176.232.124:443
160.16.142.56:8080
94.23.45.86:4143
95.217.221.146:8080
72.15.201.15:8080
167.172.199.165:8080
115.68.227.76:8080
139.59.126.41:443
185.4.135.165:8080
79.137.35.198:8080
206.189.28.199:8080
163.44.196.120:8080
201.94.166.162:443
104.168.155.143:8080
173.212.193.249:8080
45.235.8.30:8080
169.57.156.166:8080
149.56.131.28:8080
182.162.143.56:443
103.132.242.26:8080
82.223.21.224:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 996 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 996 regsvr32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 996 wrote to memory of 1380 996 regsvr32.exe 28 PID 996 wrote to memory of 1380 996 regsvr32.exe 28 PID 996 wrote to memory of 1380 996 regsvr32.exe 28 PID 996 wrote to memory of 1380 996 regsvr32.exe 28 PID 996 wrote to memory of 1380 996 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\crGw6bNNNweuGlL07he.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\UtcRshAffs\fqukyWP.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-