Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 12:42
Static task
static1
Behavioral task
behavioral1
Sample
MQIXGPw9ejl.dll
Resource
win7-20230621-en
General
-
Target
MQIXGPw9ejl.dll
-
Size
640KB
-
MD5
aad06e4245330f9ee7c0e4c67c46c686
-
SHA1
930ef00f646b571bfd4dee6abbcc3ba6b664461c
-
SHA256
7805d250b3c1d74219350badee9231fadbfc591bc43d55b96f7a25723067b74f
-
SHA512
afbd0f7b2252f4ebe837c7c4013db02ec1287ef35c24cc2e93803a92520d2c307c034976e67648097764066c25462f59cd7f89a77a5bc076cd17c81206e6c346
-
SSDEEP
6144:/6ZMFXzqfoSHr/mvcQYbi2HN8C8BgifO7y7JcuVqrWLWN7Ypsi6Ih9vH0/oUHahE:/8MFX47ivcQMNsrD+KJjO69cI
Malware Config
Extracted
emotet
Epoch4
70.36.102.35:443
92.240.254.110:8080
51.91.76.89:8080
217.182.25.250:8080
119.193.124.41:7080
45.142.114.231:8080
176.56.128.118:443
51.254.140.238:7080
173.212.193.249:8080
131.100.24.231:80
188.44.20.25:443
1.234.2.232:8080
153.126.146.25:7080
51.91.7.5:8080
151.106.112.196:8080
46.55.222.11:443
107.182.225.142:8080
82.165.152.127:8080
212.237.17.99:8080
195.201.151.129:8080
197.242.150.244:8080
103.43.46.182:443
206.188.212.92:8080
196.218.30.83:443
5.9.116.246:8080
185.157.82.211:8080
176.104.106.96:8080
159.65.88.10:8080
212.24.98.99:8080
209.250.246.206:443
45.118.135.203:7080
50.116.54.215:443
178.79.147.66:8080
72.15.201.15:8080
101.50.0.91:8080
103.75.201.2:443
31.24.158.56:8080
146.59.226.45:443
110.232.117.186:8080
138.185.72.26:8080
45.176.232.124:443
189.126.111.200:7080
129.232.188.93:443
158.69.222.101:443
164.68.99.3:8080
209.126.98.206:8080
58.227.42.236:80
203.114.109.124:443
195.154.133.20:443
192.99.251.50:443
1.234.21.73:7080
50.30.40.196:8080
216.158.226.206:443
185.8.212.130:7080
159.8.59.82:8080
45.118.115.99:8080
167.99.115.35:8080
79.172.212.216:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
regsvr32.exepid process 1028 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1720 wrote to memory of 1028 1720 regsvr32.exe regsvr32.exe PID 1720 wrote to memory of 1028 1720 regsvr32.exe regsvr32.exe PID 1720 wrote to memory of 1028 1720 regsvr32.exe regsvr32.exe PID 1720 wrote to memory of 1028 1720 regsvr32.exe regsvr32.exe PID 1720 wrote to memory of 1028 1720 regsvr32.exe regsvr32.exe PID 1720 wrote to memory of 1028 1720 regsvr32.exe regsvr32.exe PID 1720 wrote to memory of 1028 1720 regsvr32.exe regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1028-54-0x00000000002A0000-0x00000000002C4000-memory.dmpFilesize
144KB