Analysis
-
max time kernel
111s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
6058269d557a41bc3a3a7ef94f336b30N.dll
Resource
win7-20240729-en
General
-
Target
6058269d557a41bc3a3a7ef94f336b30N.dll
-
Size
273KB
-
MD5
6058269d557a41bc3a3a7ef94f336b30
-
SHA1
5e748408d327fa31a4d2a028a77777c99650fc02
-
SHA256
6e736e79e9560d23bbad0ab8edb7f3442f7f4f6ae5e94089cd9ec5ddb66f7279
-
SHA512
7f447c8e1f068e0aea1883faf79517b357e76557840bd3f9a7595120779343d299bd731abf34f892c33bd66a7191ccf79b412059eacc93276290104be92dd64e
-
SSDEEP
6144:WlLMUG2gFWLDFO9vNa11y3NPcJufFFTXNZrjJTKH:W5MT4WNaHy9P1FjbrjlKH
Malware Config
Extracted
emotet
Epoch2
71.72.196.159:80
69.49.88.46:80
157.245.123.197:8080
50.116.111.59:8080
188.165.214.98:8080
190.103.228.24:80
41.185.28.84:8080
161.0.153.60:80
84.232.252.202:443
78.188.225.105:80
95.213.236.64:8080
220.245.198.194:80
190.251.200.206:80
121.124.124.40:7080
139.99.158.11:443
176.111.60.55:8080
50.245.107.73:443
202.134.4.216:8080
119.59.116.21:8080
104.131.11.150:443
167.114.153.111:8080
2.58.16.89:8080
202.134.4.211:8080
90.160.138.175:80
134.209.144.106:443
59.21.235.119:80
172.86.188.251:8080
67.170.250.203:443
47.144.21.37:80
37.187.72.193:8080
174.118.202.24:443
115.94.207.99:443
139.59.60.244:8080
62.30.7.67:443
24.178.90.49:80
172.125.40.123:80
49.205.182.134:80
197.211.245.21:80
194.4.58.192:7080
5.2.212.254:80
74.58.215.226:80
168.235.67.138:7080
138.68.87.218:443
61.19.246.238:443
109.116.245.80:80
87.106.139.101:8080
203.153.216.189:7080
93.146.48.84:80
118.83.154.64:443
24.164.79.147:8080
50.91.114.38:80
194.190.67.75:80
62.171.142.179:8080
120.150.60.189:80
24.231.88.85:80
85.105.111.166:80
217.20.166.178:7080
89.106.251.163:80
185.94.252.104:443
89.216.122.92:80
62.75.141.82:80
139.162.60.124:8080
78.182.254.231:80
180.222.161.85:80
154.0.8.2:443
187.161.206.24:80
78.24.219.147:8080
110.145.11.73:80
144.217.7.207:7080
136.244.110.184:8080
64.207.182.168:8080
70.92.118.112:80
74.128.121.17:80
46.105.131.79:8080
66.57.108.14:443
86.98.21.56:443
109.74.5.95:8080
110.145.101.66:443
172.104.97.173:8080
70.183.211.3:80
75.177.207.146:80
173.70.61.180:80
74.40.205.197:443
190.29.166.0:80
188.219.31.12:80
94.23.237.171:443
75.109.111.18:80
181.165.68.127:80
200.116.145.225:443
74.208.45.104:8080
157.245.99.39:8080
24.179.13.119:80
98.109.133.80:80
172.105.13.66:443
78.189.148.42:80
24.69.65.8:8080
75.188.107.174:80
181.171.209.241:443
79.137.83.50:443
190.240.194.77:443
5.39.91.110:7080
185.201.9.197:8080
51.89.36.180:443
95.9.5.93:80
37.139.21.175:8080
123.176.25.234:80
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 3 1756 rundll32.exe 7 1756 rundll32.exe 8 1756 rundll32.exe 11 1756 rundll32.exe 12 1756 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1756 rundll32.exe 1756 rundll32.exe 1756 rundll32.exe 1756 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1756 1200 rundll32.exe 29 PID 1200 wrote to memory of 1756 1200 rundll32.exe 29 PID 1200 wrote to memory of 1756 1200 rundll32.exe 29 PID 1200 wrote to memory of 1756 1200 rundll32.exe 29 PID 1200 wrote to memory of 1756 1200 rundll32.exe 29 PID 1200 wrote to memory of 1756 1200 rundll32.exe 29 PID 1200 wrote to memory of 1756 1200 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6058269d557a41bc3a3a7ef94f336b30N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6058269d557a41bc3a3a7ef94f336b30N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1756
-