Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
584d18ef44af9d254d115ab93d5bb516dab54cc354119c817190aef79fd25119.dll
Resource
win7-20240708-en
General
-
Target
584d18ef44af9d254d115ab93d5bb516dab54cc354119c817190aef79fd25119.dll
-
Size
271KB
-
MD5
94b4cfed4e0711886ef2adaab00c7098
-
SHA1
af3685f08a6e056d635395edc9f7f21efadfbbf9
-
SHA256
584d18ef44af9d254d115ab93d5bb516dab54cc354119c817190aef79fd25119
-
SHA512
5b52c934927c3f4609fdc6faab476093adc609241f0384c9e0de21e13401dafb5b57c0e7b8751a695d806a5a90a6214d81d2dcc311553e7a5b3effd6b90672c2
-
SSDEEP
6144:+60EDP6uCLfGw/GpxXinM1BCo1PlumGx2mx2tXd0t115JGy:X5DpBw/KViMTB1MnEWk0115JF
Malware Config
Extracted
emotet
Epoch1
200.75.39.254:80
201.185.69.28:443
206.189.232.2:8080
138.197.99.250:8080
167.71.148.58:443
190.45.24.210:80
110.39.162.2:443
201.75.62.86:80
46.105.114.137:8080
190.247.139.101:80
59.148.253.194:8080
137.74.106.111:7080
202.79.24.136:443
177.85.167.10:80
80.15.100.37:80
45.16.226.117:443
190.24.243.186:80
138.97.60.141:7080
2.80.112.146:80
81.214.253.80:443
87.106.46.107:8080
46.101.58.37:8080
111.67.12.221:8080
201.241.127.190:80
217.13.106.14:8080
177.23.7.151:80
95.76.153.115:80
70.32.84.74:8080
5.12.233.12:80
186.177.174.163:80
12.163.208.58:80
192.232.229.53:4143
170.81.48.2:80
70.32.115.157:8080
199.203.62.165:80
190.251.216.100:80
185.94.252.27:443
110.39.160.38:443
45.184.103.73:80
185.183.16.47:80
51.15.7.145:80
50.28.51.143:8080
187.162.250.23:443
191.223.36.170:80
213.52.74.198:80
122.201.23.45:443
78.206.229.130:80
31.27.59.105:80
190.210.246.253:80
60.93.23.51:80
178.250.54.208:8080
85.214.26.7:8080
94.176.234.118:443
202.134.4.210:7080
190.114.254.163:8080
188.225.32.231:7080
155.186.9.160:80
104.131.41.185:8080
188.135.15.49:80
184.66.18.83:80
192.175.111.212:7080
187.162.248.237:80
212.71.237.140:8080
81.215.230.173:443
68.183.170.114:8080
81.17.93.134:80
51.255.165.160:8080
62.84.75.50:80
190.136.176.89:80
181.30.61.163:443
154.127.113.242:80
5.2.136.90:80
1.226.84.243:8080
83.144.109.70:80
172.245.248.239:8080
191.241.233.198:80
190.162.232.138:80
152.170.79.100:80
5.196.35.138:7080
46.43.2.95:8080
197.232.36.108:80
186.147.237.3:8080
74.58.215.226:80
82.208.146.142:7080
138.97.60.140:8080
186.146.13.184:443
172.104.169.32:8080
211.215.18.93:8080
83.169.21.32:7080
152.169.22.67:80
149.202.72.142:7080
209.236.123.42:8080
12.162.84.2:8080
35.143.99.174:80
178.211.45.66:8080
190.64.88.186:443
82.48.39.246:80
93.149.120.214:80
68.183.190.199:8080
201.143.224.27:80
105.209.235.113:8080
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 3 2152 rundll32.exe 5 2152 rundll32.exe 6 2152 rundll32.exe 7 2152 rundll32.exe 8 2152 rundll32.exe 9 2152 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 2152 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2672 wrote to memory of 2152 2672 rundll32.exe rundll32.exe PID 2672 wrote to memory of 2152 2672 rundll32.exe rundll32.exe PID 2672 wrote to memory of 2152 2672 rundll32.exe rundll32.exe PID 2672 wrote to memory of 2152 2672 rundll32.exe rundll32.exe PID 2672 wrote to memory of 2152 2672 rundll32.exe rundll32.exe PID 2672 wrote to memory of 2152 2672 rundll32.exe rundll32.exe PID 2672 wrote to memory of 2152 2672 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\584d18ef44af9d254d115ab93d5bb516dab54cc354119c817190aef79fd25119.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\584d18ef44af9d254d115ab93d5bb516dab54cc354119c817190aef79fd25119.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152