Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
396709d639484e6d5c673a5102a6623fb5ae21a0cf6b1aafead144cfd1be28dc.dll
Resource
win7-20240221-en
General
-
Target
396709d639484e6d5c673a5102a6623fb5ae21a0cf6b1aafead144cfd1be28dc.dll
-
Size
684KB
-
MD5
e933b0aa9c2f5e6f18cb0718d0e064ff
-
SHA1
81de5e8aea0448bc75b540f1c530517c550a1883
-
SHA256
396709d639484e6d5c673a5102a6623fb5ae21a0cf6b1aafead144cfd1be28dc
-
SHA512
f0d5db89ac71a4836398ba9968c1b7faa09bb5fd0651af6b32cc7c870f543fef3773cb618591f0e73bf09b8fb177a933b079121b87ee882f4759f9fd418da2fb
-
SSDEEP
6144:jpvac/hrq/4wi/fRBe06Av38/giQEjSdLZJ8iqOqnPoypSlwDmL0TX9zZ7cuQUa6:y4wwRBe01P8/giQE8zsnS9W7PQUaIF
Malware Config
Extracted
emotet
Epoch4
149.202.179.100:443
103.75.201.4:443
129.232.188.93:443
50.116.54.215:443
203.114.109.124:443
217.182.143.207:443
212.237.5.209:443
79.172.212.216:8080
144.76.186.49:8080
159.8.59.82:8080
131.100.24.231:80
212.237.17.99:8080
81.0.236.90:443
159.89.230.105:443
164.68.99.3:8080
212.237.56.116:7080
162.243.175.63:443
195.154.133.20:443
110.232.117.186:8080
45.142.114.231:8080
103.75.201.2:443
216.158.226.206:443
158.69.222.101:443
178.79.147.66:8080
192.254.71.210:443
176.104.106.96:8080
58.227.42.236:80
160.16.102.168:80
41.76.108.46:8080
107.182.225.142:8080
45.118.135.203:7080
46.55.222.11:443
51.38.71.0:443
185.157.82.211:8080
162.214.50.39:7080
209.59.138.75:7080
173.212.193.249:8080
207.38.84.195:8080
200.17.134.35:7080
212.24.98.99:8080
178.63.25.185:443
45.176.232.124:443
138.185.72.26:8080
45.118.115.99:8080
104.251.214.46:8080
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4840 wrote to memory of 2920 4840 regsvr32.exe 86 PID 4840 wrote to memory of 2920 4840 regsvr32.exe 86 PID 4840 wrote to memory of 2920 4840 regsvr32.exe 86 PID 2920 wrote to memory of 4372 2920 regsvr32.exe 92 PID 2920 wrote to memory of 4372 2920 regsvr32.exe 92 PID 2920 wrote to memory of 4372 2920 regsvr32.exe 92
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\396709d639484e6d5c673a5102a6623fb5ae21a0cf6b1aafead144cfd1be28dc.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\396709d639484e6d5c673a5102a6623fb5ae21a0cf6b1aafead144cfd1be28dc.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\396709d639484e6d5c673a5102a6623fb5ae21a0cf6b1aafead144cfd1be28dc.dll",DllRegisterServer3⤵PID:4372
-
-