Overview
overview
10Static
static
100864575d4f...a0.dll
windows7-x64
30864575d4f...a0.dll
windows10-2004-x64
3933511776c...82.dll
windows7-x64
10933511776c...82.dll
windows10-2004-x64
1062bc8624b6...18.exe
windows7-x64
1062bc8624b6...18.exe
windows10-2004-x64
10bea9fc6693...3a.exe
windows7-x64
10bea9fc6693...3a.exe
windows10-2004-x64
10emotet_exe...44.dll
windows7-x64
10emotet_exe...44.dll
windows10-2004-x64
103ec811757a...e9.exe
windows7-x64
103ec811757a...e9.exe
windows10-2004-x64
1057800373ef...15.dll
windows7-x64
357800373ef...15.dll
windows10-2004-x64
361a47ebee9...f9.dll
windows7-x64
1061a47ebee9...f9.dll
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 12:11
Behavioral task
behavioral1
Sample
0864575d4f487e52a1479c61c2c4ad16742d92e16d0c10f5ed2b40506bbc6ca0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0864575d4f487e52a1479c61c2c4ad16742d92e16d0c10f5ed2b40506bbc6ca0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
62bc8624b6ed645ddbe1420ca67376863c88e58e347fc8282001a2b9e3330918.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
62bc8624b6ed645ddbe1420ca67376863c88e58e347fc8282001a2b9e3330918.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
bea9fc669319cd16df759974397e79c05e7565e75ca7c052af346e08b5f1d13a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
bea9fc669319cd16df759974397e79c05e7565e75ca7c052af346e08b5f1d13a.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
emotet_exe_e5_53d5a86b1cb032154775e725ed728ba4bd819d40f3a541744661fcbd4d702319_2022-04-19__000144.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
emotet_exe_e5_53d5a86b1cb032154775e725ed728ba4bd819d40f3a541744661fcbd4d702319_2022-04-19__000144.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
3ec811757abece5eeb8d73fce8770390b5714b16e075c2558de050205cd8c8e9.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3ec811757abece5eeb8d73fce8770390b5714b16e075c2558de050205cd8c8e9.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
61a47ebee921db8a16a8f070edcb86b5efd47a8d185bf4691b57e76f697981f9.dll
Resource
win7-20240903-en
General
-
Target
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll
-
Size
735KB
-
MD5
14e8fc68273e3cc5377ea8efd0230273
-
SHA1
49069bf64828b11730c36f112fde9131c3c86a63
-
SHA256
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82
-
SHA512
6cbf4d197b8fabfccbfb516acd4c11cb23934c3606e8ade1cfcf3845e2748405fb3b2d2012ad052607e4e959aea2bc75365ee9d8ca2bba7d1f4e1074ca35568a
-
SSDEEP
12288:agvTeqrCeX329Soy/O+TCJJU2QyDqXkkpodzR6TqKCKDeS:tviEdX3Y7GTCRhukkpbqUx
Malware Config
Extracted
emotet
Epoch4
131.100.24.231:80
209.59.138.75:7080
103.8.26.103:8080
51.38.71.0:443
212.237.17.99:8080
79.172.212.216:8080
207.38.84.195:8080
104.168.155.129:8080
178.79.147.66:8080
46.55.222.11:443
103.8.26.102:8080
192.254.71.210:443
45.176.232.124:443
203.114.109.124:443
51.68.175.8:8080
58.227.42.236:80
45.142.114.231:8080
217.182.143.207:443
178.63.25.185:443
45.118.115.99:8080
103.75.201.2:443
104.251.214.46:8080
158.69.222.101:443
81.0.236.90:443
45.118.135.203:7080
176.104.106.96:8080
212.237.56.116:7080
216.158.226.206:443
173.212.193.249:8080
50.116.54.215:443
138.185.72.26:8080
41.76.108.46:8080
212.237.5.209:443
107.182.225.142:8080
195.154.133.20:443
162.214.50.39:7080
110.232.117.186:8080
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1036 2516 regsvr32.exe 30 PID 2516 wrote to memory of 1036 2516 regsvr32.exe 30 PID 2516 wrote to memory of 1036 2516 regsvr32.exe 30 PID 2516 wrote to memory of 1036 2516 regsvr32.exe 30 PID 2516 wrote to memory of 1036 2516 regsvr32.exe 30 PID 2516 wrote to memory of 1036 2516 regsvr32.exe 30 PID 2516 wrote to memory of 1036 2516 regsvr32.exe 30 PID 1036 wrote to memory of 1604 1036 regsvr32.exe 31 PID 1036 wrote to memory of 1604 1036 regsvr32.exe 31 PID 1036 wrote to memory of 1604 1036 regsvr32.exe 31 PID 1036 wrote to memory of 1604 1036 regsvr32.exe 31 PID 1036 wrote to memory of 1604 1036 regsvr32.exe 31 PID 1036 wrote to memory of 1604 1036 regsvr32.exe 31 PID 1036 wrote to memory of 1604 1036 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll",DllRegisterServer3⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-