Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 12:51
Static task
static1
Behavioral task
behavioral1
Sample
xpng5kkgI.dll
Resource
win7-20230621-en
General
-
Target
xpng5kkgI.dll
-
Size
348KB
-
MD5
dca3f0a3eecf16ac4b72615d712112e9
-
SHA1
909870e8ea76626fbe13e2c960560c2a165bd102
-
SHA256
b5abacf24ae5aa96016c09f71a78d0121fff396d6154740eab622c4751e1764f
-
SHA512
4bb8558e76f78b1078526952420789552930119fff8a8163d86e809186bcc7f2d2b78ee1475bc2d143648a1e890da841f0dd24704a3a1b93783b686cd95dd510
-
SSDEEP
3072:oa99Ky1S0SD8MHjO73Ba01/H/7FlwZ2RJJBvX+WUEAQbb:oaGy1nS8MHi7xai73JtkWUEAKb
Malware Config
Extracted
emotet
Epoch1
181.10.46.92:80
2.58.16.88:8080
206.189.232.2:8080
178.250.54.208:8080
167.71.148.58:443
202.134.4.210:7080
187.162.248.237:80
78.206.229.130:80
85.214.26.7:8080
5.196.35.138:7080
1.226.84.243:8080
110.39.162.2:443
185.183.16.47:80
152.231.89.226:80
138.97.60.141:7080
94.176.234.118:443
46.101.58.37:8080
93.146.143.191:80
70.32.84.74:8080
137.74.106.111:7080
80.15.100.37:80
68.183.190.199:8080
154.127.113.242:80
70.32.115.157:8080
12.163.208.58:80
31.27.59.105:80
110.39.160.38:443
68.183.170.114:8080
87.106.46.107:8080
105.209.235.113:8080
185.94.252.27:443
209.236.123.42:8080
60.93.23.51:80
186.177.174.163:80
177.85.167.10:80
111.67.12.221:8080
191.241.233.198:80
149.202.72.142:7080
12.162.84.2:8080
217.13.106.14:8080
197.232.36.108:80
192.232.229.53:4143
143.0.85.206:7080
177.23.7.151:80
213.52.74.198:80
51.255.165.160:8080
181.30.61.163:443
93.149.120.214:80
212.71.237.140:8080
51.15.7.145:80
190.247.139.101:80
188.135.15.49:80
155.186.9.160:80
91.233.197.70:80
95.76.153.115:80
46.43.2.95:8080
152.169.22.67:80
138.197.99.250:8080
104.131.41.185:8080
211.215.18.93:8080
81.215.230.173:443
152.170.79.100:80
190.114.254.163:8080
190.251.216.100:80
201.241.127.190:80
82.208.146.142:7080
172.245.248.239:8080
190.64.88.186:443
192.175.111.212:7080
50.28.51.143:8080
81.17.93.134:80
202.79.24.136:443
190.24.243.186:80
190.162.232.138:80
62.84.75.50:80
190.210.246.253:80
190.45.24.210:80
172.104.169.32:8080
82.48.39.246:80
188.225.32.231:7080
45.16.226.117:443
178.211.45.66:8080
138.97.60.140:8080
122.201.23.45:443
170.81.48.2:80
81.214.253.80:443
80.249.176.206:80
83.169.21.32:7080
46.105.114.137:8080
83.144.109.70:80
191.223.36.170:80
200.75.39.254:80
201.185.69.28:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 28 4116 rundll32.exe 47 4116 rundll32.exe 66 4116 rundll32.exe 72 4116 rundll32.exe 88 4116 rundll32.exe 92 4116 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2044 rundll32.exe 4116 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ftzjwyexj\fndbwxca.rnq rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe 4116 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4892 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4892 4952 rundll32.exe 83 PID 4952 wrote to memory of 4892 4952 rundll32.exe 83 PID 4952 wrote to memory of 4892 4952 rundll32.exe 83 PID 4892 wrote to memory of 2044 4892 rundll32.exe 84 PID 4892 wrote to memory of 2044 4892 rundll32.exe 84 PID 4892 wrote to memory of 2044 4892 rundll32.exe 84 PID 2044 wrote to memory of 4116 2044 rundll32.exe 85 PID 2044 wrote to memory of 4116 2044 rundll32.exe 85 PID 2044 wrote to memory of 4116 2044 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\xpng5kkgI.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\xpng5kkgI.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ftzjwyexj\fndbwxca.rnq",KczqJElC3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ftzjwyexj\fndbwxca.rnq",#14⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD5dca3f0a3eecf16ac4b72615d712112e9
SHA1909870e8ea76626fbe13e2c960560c2a165bd102
SHA256b5abacf24ae5aa96016c09f71a78d0121fff396d6154740eab622c4751e1764f
SHA5124bb8558e76f78b1078526952420789552930119fff8a8163d86e809186bcc7f2d2b78ee1475bc2d143648a1e890da841f0dd24704a3a1b93783b686cd95dd510
-
Filesize
348KB
MD5dca3f0a3eecf16ac4b72615d712112e9
SHA1909870e8ea76626fbe13e2c960560c2a165bd102
SHA256b5abacf24ae5aa96016c09f71a78d0121fff396d6154740eab622c4751e1764f
SHA5124bb8558e76f78b1078526952420789552930119fff8a8163d86e809186bcc7f2d2b78ee1475bc2d143648a1e890da841f0dd24704a3a1b93783b686cd95dd510