Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
6058269d557a41bc3a3a7ef94f336b30N.dll
Resource
win7-20240729-en
General
-
Target
6058269d557a41bc3a3a7ef94f336b30N.dll
-
Size
273KB
-
MD5
6058269d557a41bc3a3a7ef94f336b30
-
SHA1
5e748408d327fa31a4d2a028a77777c99650fc02
-
SHA256
6e736e79e9560d23bbad0ab8edb7f3442f7f4f6ae5e94089cd9ec5ddb66f7279
-
SHA512
7f447c8e1f068e0aea1883faf79517b357e76557840bd3f9a7595120779343d299bd731abf34f892c33bd66a7191ccf79b412059eacc93276290104be92dd64e
-
SSDEEP
6144:WlLMUG2gFWLDFO9vNa11y3NPcJufFFTXNZrjJTKH:W5MT4WNaHy9P1FjbrjlKH
Malware Config
Extracted
emotet
Epoch2
71.72.196.159:80
69.49.88.46:80
157.245.123.197:8080
50.116.111.59:8080
188.165.214.98:8080
190.103.228.24:80
41.185.28.84:8080
161.0.153.60:80
84.232.252.202:443
78.188.225.105:80
95.213.236.64:8080
220.245.198.194:80
190.251.200.206:80
121.124.124.40:7080
139.99.158.11:443
176.111.60.55:8080
50.245.107.73:443
202.134.4.216:8080
119.59.116.21:8080
104.131.11.150:443
167.114.153.111:8080
2.58.16.89:8080
202.134.4.211:8080
90.160.138.175:80
134.209.144.106:443
59.21.235.119:80
172.86.188.251:8080
67.170.250.203:443
47.144.21.37:80
37.187.72.193:8080
174.118.202.24:443
115.94.207.99:443
139.59.60.244:8080
62.30.7.67:443
24.178.90.49:80
172.125.40.123:80
49.205.182.134:80
197.211.245.21:80
194.4.58.192:7080
5.2.212.254:80
74.58.215.226:80
168.235.67.138:7080
138.68.87.218:443
61.19.246.238:443
109.116.245.80:80
87.106.139.101:8080
203.153.216.189:7080
93.146.48.84:80
118.83.154.64:443
24.164.79.147:8080
50.91.114.38:80
194.190.67.75:80
62.171.142.179:8080
120.150.60.189:80
24.231.88.85:80
85.105.111.166:80
217.20.166.178:7080
89.106.251.163:80
185.94.252.104:443
89.216.122.92:80
62.75.141.82:80
139.162.60.124:8080
78.182.254.231:80
180.222.161.85:80
154.0.8.2:443
187.161.206.24:80
78.24.219.147:8080
110.145.11.73:80
144.217.7.207:7080
136.244.110.184:8080
64.207.182.168:8080
70.92.118.112:80
74.128.121.17:80
46.105.131.79:8080
66.57.108.14:443
86.98.21.56:443
109.74.5.95:8080
110.145.101.66:443
172.104.97.173:8080
70.183.211.3:80
75.177.207.146:80
173.70.61.180:80
74.40.205.197:443
190.29.166.0:80
188.219.31.12:80
94.23.237.171:443
75.109.111.18:80
181.165.68.127:80
200.116.145.225:443
74.208.45.104:8080
157.245.99.39:8080
24.179.13.119:80
98.109.133.80:80
172.105.13.66:443
78.189.148.42:80
24.69.65.8:8080
75.188.107.174:80
181.171.209.241:443
79.137.83.50:443
190.240.194.77:443
5.39.91.110:7080
185.201.9.197:8080
51.89.36.180:443
95.9.5.93:80
37.139.21.175:8080
123.176.25.234:80
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 13 4968 rundll32.exe 25 4968 rundll32.exe 37 4968 rundll32.exe 40 4968 rundll32.exe 47 4968 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe 4968 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4968 4236 rundll32.exe 83 PID 4236 wrote to memory of 4968 4236 rundll32.exe 83 PID 4236 wrote to memory of 4968 4236 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6058269d557a41bc3a3a7ef94f336b30N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6058269d557a41bc3a3a7ef94f336b30N.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4968
-