Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
8d8138c23bf514a984918f7b5c5a7501e91b2c058574b7ce0b9ccbe638e82387.dll
Resource
win7-20240221-en
General
-
Target
8d8138c23bf514a984918f7b5c5a7501e91b2c058574b7ce0b9ccbe638e82387.dll
-
Size
749KB
-
MD5
c6c3f4f0cc76fbb41eeb97f8475fe126
-
SHA1
b4bc00b99df0b94a3d6c10bc62c9dec1d1a07620
-
SHA256
8d8138c23bf514a984918f7b5c5a7501e91b2c058574b7ce0b9ccbe638e82387
-
SHA512
364df19b4f3a67c19d10faab027b0ec262dc1f11c81f179ea0f3986f42d7445e8536fb1ffaade224ada69ebe3f4fd05be156efca4333384dfc03620b15e294f3
-
SSDEEP
12288:JKUuppiKVoByYUTsRuEhj4GbOX39UfNWuoDtS+7g4jQj9J/tWTR/S:JapiKiBEmj4GbOX399Md9J/0TY
Malware Config
Extracted
emotet
Epoch5
209.239.112.82:8080
116.124.128.206:8080
45.63.5.129:443
128.199.192.135:8080
51.178.61.60:443
168.197.250.14:80
177.72.80.14:7080
51.210.242.234:8080
142.4.219.173:8080
78.47.204.80:443
78.46.73.125:443
37.44.244.177:8080
37.59.209.141:8080
104.131.62.48:8080
190.90.233.66:443
185.148.168.220:8080
185.148.168.15:8080
62.171.178.147:8080
191.252.103.16:80
54.38.242.185:443
85.214.67.203:8080
217.182.143.207:443
159.69.237.188:443
210.57.209.142:8080
54.37.228.122:443
207.148.81.119:8080
195.77.239.39:8080
66.42.57.149:443
195.154.146.35:443
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2208 wrote to memory of 3068 2208 regsvr32.exe regsvr32.exe PID 2208 wrote to memory of 3068 2208 regsvr32.exe regsvr32.exe PID 2208 wrote to memory of 3068 2208 regsvr32.exe regsvr32.exe PID 2208 wrote to memory of 3068 2208 regsvr32.exe regsvr32.exe PID 2208 wrote to memory of 3068 2208 regsvr32.exe regsvr32.exe PID 2208 wrote to memory of 3068 2208 regsvr32.exe regsvr32.exe PID 2208 wrote to memory of 3068 2208 regsvr32.exe regsvr32.exe PID 3068 wrote to memory of 1136 3068 regsvr32.exe rundll32.exe PID 3068 wrote to memory of 1136 3068 regsvr32.exe rundll32.exe PID 3068 wrote to memory of 1136 3068 regsvr32.exe rundll32.exe PID 3068 wrote to memory of 1136 3068 regsvr32.exe rundll32.exe PID 3068 wrote to memory of 1136 3068 regsvr32.exe rundll32.exe PID 3068 wrote to memory of 1136 3068 regsvr32.exe rundll32.exe PID 3068 wrote to memory of 1136 3068 regsvr32.exe rundll32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8d8138c23bf514a984918f7b5c5a7501e91b2c058574b7ce0b9ccbe638e82387.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8d8138c23bf514a984918f7b5c5a7501e91b2c058574b7ce0b9ccbe638e82387.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\8d8138c23bf514a984918f7b5c5a7501e91b2c058574b7ce0b9ccbe638e82387.dll",DllRegisterServer3⤵