Analysis
-
max time kernel
83s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 01:11
Behavioral task
behavioral1
Sample
c36e8e1744e08d1d3eda730e588fca9e54d1ea9412e13c2e2def4281d31855cc.dll
Resource
win7-20240903-en
General
-
Target
c36e8e1744e08d1d3eda730e588fca9e54d1ea9412e13c2e2def4281d31855cc.dll
-
Size
58KB
-
MD5
024c30f66bd2f5b79d0f5e802ea988fd
-
SHA1
740402706cfbaab2f4b58653abf18ddf0ff3e67a
-
SHA256
c36e8e1744e08d1d3eda730e588fca9e54d1ea9412e13c2e2def4281d31855cc
-
SHA512
83b83510d31050b8ab8e2832b2f1b050382f6c85b43ba8b864b24e06d974e4d6dadbc67b005164bdc4b483b550771c18e6d0015b908bda9ddc2b506a3712ceb1
-
SSDEEP
768:9Lo2dWDXnukzBniY0O5aX5ATwOoOZz7sXzJsOZcTuWqXMCCanWef5G+SBq:JnW+OUX5e7sXlZcTfqXM5aWg5GvBq
Malware Config
Extracted
emotet
Epoch3
116.91.240.96:80
167.71.227.113:8080
190.85.46.52:7080
162.144.42.60:8080
202.166.170.43:80
95.216.205.155:8080
120.51.34.254:80
103.93.220.182:80
111.89.241.139:80
60.125.114.64:443
45.177.120.37:8080
185.86.148.68:443
75.127.14.170:8080
119.92.77.17:80
203.153.216.178:7080
172.96.190.154:8080
179.5.118.12:80
153.229.219.1:443
139.59.12.63:8080
115.79.195.246:80
103.229.73.17:8080
195.201.56.70:8080
190.192.39.136:80
183.77.227.38:80
45.239.204.100:80
192.163.221.191:8080
46.32.229.152:8080
73.55.128.120:80
113.203.238.130:80
138.201.45.2:8080
180.148.4.130:8080
77.74.78.80:443
115.79.59.157:80
91.83.93.103:443
181.80.129.181:80
41.185.29.128:8080
178.33.167.120:8080
185.208.226.142:8080
91.75.75.46:80
86.57.216.23:80
143.95.101.72:8080
118.33.121.37:80
116.202.10.123:8080
103.80.51.61:8080
54.38.143.245:8080
50.116.78.109:8080
128.106.187.110:80
139.59.61.215:443
190.191.171.72:80
58.27.215.3:8080
223.17.215.76:80
37.205.9.252:7080
37.46.129.215:8080
46.105.131.68:8080
192.241.220.183:8080
24.231.51.190:80
113.161.148.81:80
109.206.139.119:80
118.243.83.70:80
185.142.236.163:443
172.105.78.244:8080
185.80.172.199:80
190.194.12.132:80
36.91.44.183:80
200.116.93.61:80
192.210.217.94:8080
93.20.157.143:80
198.57.203.63:8080
78.186.65.230:80
175.103.38.146:80
115.135.158.13:80
113.160.248.110:80
88.247.58.26:80
157.7.164.178:8081
67.121.104.51:20
74.208.173.91:8080
113.156.82.32:80
51.38.201.19:7080
14.241.182.160:80
79.133.6.236:8080
169.1.211.133:80
202.153.220.157:80
8.4.9.137:8080
220.106.127.191:443
5.79.70.250:8080
37.187.100.220:7080
113.193.239.51:443
Signatures
-
resource yara_rule behavioral1/memory/2768-0-0x00000000001A0000-0x00000000001B0000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2768 rundll32.exe 2768 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2768 1120 rundll32.exe 29 PID 1120 wrote to memory of 2768 1120 rundll32.exe 29 PID 1120 wrote to memory of 2768 1120 rundll32.exe 29 PID 1120 wrote to memory of 2768 1120 rundll32.exe 29 PID 1120 wrote to memory of 2768 1120 rundll32.exe 29 PID 1120 wrote to memory of 2768 1120 rundll32.exe 29 PID 1120 wrote to memory of 2768 1120 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c36e8e1744e08d1d3eda730e588fca9e54d1ea9412e13c2e2def4281d31855cc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c36e8e1744e08d1d3eda730e588fca9e54d1ea9412e13c2e2def4281d31855cc.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768
-