Resubmissions

25-03-2024 08:35

240325-khgdnsec8t 10

23-03-2024 19:58

240323-ypv3asbg23 10

Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2024 19:58

General

  • Target

    4c29066cd91c1834e7e15d4a891517151bc58835d4cf57dfd86fddc5bf4e0f77.dll

  • Size

    784KB

  • MD5

    0944574a90a00beeadaabebbb244ac38

  • SHA1

    508bf95bbd3f92d6f4e75478937ba6efbd310dd8

  • SHA256

    4c29066cd91c1834e7e15d4a891517151bc58835d4cf57dfd86fddc5bf4e0f77

  • SHA512

    e1d9919de84e15617b0000f5d16397fa0a8484acdd0b2e1896974aeb92284a84464b26fc5f3f71cdd301e6a76edfda9aba833eaf013b02779f3ef64ca9646cee

  • SSDEEP

    12288:aA9e3OrvpgqjtQFecC6dddifiHxoB3rNd9CDr:blrvpgqj2FefQc3rLoD

Malware Config

Extracted

Family

emotet

Botnet

Epoch5

C2

185.244.166.137:443

185.168.130.138:443

59.148.253.194:443

78.46.73.125:443

195.77.239.39:8080

104.131.62.48:8080

69.16.218.101:8080

203.153.216.46:443

195.154.146.35:443

190.90.233.66:443

191.252.103.16:80

37.44.244.177:8080

168.197.250.14:80

116.124.128.206:8080

54.37.228.122:443

159.69.237.188:443

85.214.67.203:8080

210.57.209.142:8080

78.47.204.80:443

185.148.168.220:8080

eck1.plain
ecs1.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4c29066cd91c1834e7e15d4a891517151bc58835d4cf57dfd86fddc5bf4e0f77.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\4c29066cd91c1834e7e15d4a891517151bc58835d4cf57dfd86fddc5bf4e0f77.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3084
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\4c29066cd91c1834e7e15d4a891517151bc58835d4cf57dfd86fddc5bf4e0f77.dll",DllRegisterServer
        3⤵
          PID:2520

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3084-0-0x0000000002D80000-0x0000000002DA7000-memory.dmp
      Filesize

      156KB