Analysis

  • max time kernel
    111s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 17:19

General

  • Target

    6058269d557a41bc3a3a7ef94f336b30N.dll

  • Size

    273KB

  • MD5

    6058269d557a41bc3a3a7ef94f336b30

  • SHA1

    5e748408d327fa31a4d2a028a77777c99650fc02

  • SHA256

    6e736e79e9560d23bbad0ab8edb7f3442f7f4f6ae5e94089cd9ec5ddb66f7279

  • SHA512

    7f447c8e1f068e0aea1883faf79517b357e76557840bd3f9a7595120779343d299bd731abf34f892c33bd66a7191ccf79b412059eacc93276290104be92dd64e

  • SSDEEP

    6144:WlLMUG2gFWLDFO9vNa11y3NPcJufFFTXNZrjJTKH:W5MT4WNaHy9P1FjbrjlKH

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

71.72.196.159:80

69.49.88.46:80

157.245.123.197:8080

50.116.111.59:8080

188.165.214.98:8080

190.103.228.24:80

41.185.28.84:8080

161.0.153.60:80

84.232.252.202:443

78.188.225.105:80

95.213.236.64:8080

220.245.198.194:80

190.251.200.206:80

121.124.124.40:7080

139.99.158.11:443

176.111.60.55:8080

50.245.107.73:443

202.134.4.216:8080

119.59.116.21:8080

104.131.11.150:443

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Blocklisted process makes network request 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6058269d557a41bc3a3a7ef94f336b30N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6058269d557a41bc3a3a7ef94f336b30N.dll,#1
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1756-0-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/1756-1-0x0000000010000000-0x0000000010021000-memory.dmp

    Filesize

    132KB

  • memory/1756-2-0x0000000010000000-0x000000001004B000-memory.dmp

    Filesize

    300KB

  • memory/1756-3-0x0000000010000000-0x0000000010021000-memory.dmp

    Filesize

    132KB

  • memory/1756-8-0x0000000010000000-0x000000001004B000-memory.dmp

    Filesize

    300KB