Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
5da102cc1ff7d842e3b5c9d6f571bd3b3afdc1715d37f120b31e1859928f5837.dll
Resource
win7-20240221-en
General
-
Target
5da102cc1ff7d842e3b5c9d6f571bd3b3afdc1715d37f120b31e1859928f5837.dll
-
Size
664KB
-
MD5
a4ecfada58560cde6fa8efb230ae7175
-
SHA1
25c97e473919084598779cc8faee36c23fdb8911
-
SHA256
5da102cc1ff7d842e3b5c9d6f571bd3b3afdc1715d37f120b31e1859928f5837
-
SHA512
24fc0218924c59c366d9038f878352d765a20dad35f637d917fd5d91c60d96ff256d3cb13b68a33d81df6dbb32d389e1b930078a58603897fc42970027c211da
-
SSDEEP
12288:DtAanana8Meee0GBGu3qI+3DNJ3vE6v5eexS332d7t5hT/hexLx:Kanana8qGBGuoNxEQxCM7o
Malware Config
Extracted
emotet
Epoch5
165.22.61.235:443
121.78.112.42:8080
216.10.251.121:8080
195.77.239.39:8080
195.154.146.35:443
68.183.93.250:443
139.196.72.155:8080
194.9.172.107:8080
196.44.98.190:8080
128.199.192.135:8080
5.56.132.177:8080
78.46.73.125:443
87.106.97.83:7080
66.42.57.149:443
37.44.244.177:8080
190.90.233.66:443
203.153.216.46:443
207.148.81.119:8080
103.41.204.169:8080
104.131.62.48:8080
185.148.168.15:8080
217.182.143.207:443
198.199.98.78:8080
103.82.248.59:7080
185.168.130.138:443
202.28.34.99:8080
59.148.253.194:443
37.59.209.141:8080
185.148.168.220:8080
54.37.228.122:443
85.214.67.203:8080
85.25.120.45:8080
118.98.72.86:443
103.42.58.120:7080
78.47.204.80:443
202.134.4.210:7080
93.104.209.107:8080
2.58.16.87:8080
62.171.178.147:8080
45.71.195.104:8080
116.124.128.206:8080
191.252.103.16:80
54.37.106.167:8080
88.217.172.165:8080
54.38.242.185:443
210.57.209.142:8080
159.69.237.188:443
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
regsvr32.exepid process 1756 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1280 wrote to memory of 1756 1280 regsvr32.exe regsvr32.exe PID 1280 wrote to memory of 1756 1280 regsvr32.exe regsvr32.exe PID 1280 wrote to memory of 1756 1280 regsvr32.exe regsvr32.exe PID 1280 wrote to memory of 1756 1280 regsvr32.exe regsvr32.exe PID 1280 wrote to memory of 1756 1280 regsvr32.exe regsvr32.exe PID 1280 wrote to memory of 1756 1280 regsvr32.exe regsvr32.exe PID 1280 wrote to memory of 1756 1280 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5da102cc1ff7d842e3b5c9d6f571bd3b3afdc1715d37f120b31e1859928f5837.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5da102cc1ff7d842e3b5c9d6f571bd3b3afdc1715d37f120b31e1859928f5837.dll2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1756-0-0x0000000000280000-0x00000000002B4000-memory.dmpFilesize
208KB