Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 10:40
Behavioral task
behavioral1
Sample
712360d329726db960b735a9ea26c1faaab33b2e4b8e0b567d61adb41e006badN.dll
Resource
win7-20240729-en
General
-
Target
712360d329726db960b735a9ea26c1faaab33b2e4b8e0b567d61adb41e006badN.dll
-
Size
58KB
-
MD5
3e53903152b934f8b0ad00c5d3c71310
-
SHA1
5609a49295ad3f5a50d3ad072ffcfb13700868c1
-
SHA256
712360d329726db960b735a9ea26c1faaab33b2e4b8e0b567d61adb41e006bad
-
SHA512
07d765b268cb1635e9b2eb14ed404cc384cf656bf6372811310489b942eb73331204e2a0f65afcfa769054ae51d2cca9dd1ade92cd032dfab67b7a4492d2f403
-
SSDEEP
768:jLo2dWDyLid06+Z3ZMUS7m/yAclFYR7AvUfJ1JP2knnPxCUrtd:fnWeM0pouqlXYREcfJb2knnQUr
Malware Config
Extracted
emotet
Epoch2
24.43.32.186:80
38.111.46.46:8080
134.209.36.254:8080
162.241.242.173:8080
74.120.55.163:80
61.92.17.12:80
219.74.18.66:443
156.155.166.221:80
104.131.44.150:8080
37.139.21.175:8080
94.1.108.190:443
169.239.182.217:8080
220.245.198.194:80
139.99.158.11:443
91.211.88.52:7080
62.75.141.82:80
174.45.13.118:80
137.119.36.33:80
188.219.31.12:80
103.86.49.11:8080
104.131.11.150:443
124.41.215.226:80
78.187.156.31:80
104.32.141.43:80
47.144.21.12:443
93.147.212.206:80
200.123.150.89:443
121.7.127.163:80
200.114.213.233:8080
94.200.114.161:80
24.179.13.119:80
84.39.182.7:80
97.82.79.83:80
87.106.136.232:8080
5.196.74.210:8080
24.43.99.75:80
213.196.135.145:80
94.23.237.171:443
74.134.41.124:80
96.249.236.156:443
95.213.236.64:8080
137.59.187.107:8080
75.139.38.211:80
82.225.49.121:80
123.176.25.234:80
194.187.133.160:443
62.30.7.67:443
109.74.5.95:8080
176.111.60.55:8080
24.137.76.62:80
37.187.72.193:8080
110.145.77.103:80
153.137.36.142:80
1.221.254.82:80
195.7.12.8:80
110.5.16.198:80
185.94.252.104:443
104.236.246.93:8080
78.24.219.147:8080
85.152.162.105:80
85.105.205.77:8080
139.59.60.244:8080
79.137.83.50:443
50.91.114.38:80
172.91.208.86:80
74.219.172.26:80
83.169.36.251:8080
153.232.188.106:80
209.141.54.221:8080
168.235.67.138:7080
139.130.242.43:80
121.124.124.40:7080
89.216.122.92:80
203.153.216.189:7080
187.161.206.24:80
157.245.99.39:8080
195.251.213.56:80
71.72.196.159:80
174.102.48.180:443
181.169.34.190:80
140.186.212.146:80
201.173.217.124:443
42.200.107.142:80
79.98.24.39:8080
5.39.91.110:7080
139.162.108.71:8080
74.208.45.104:8080
61.19.246.238:443
50.35.17.13:80
95.179.229.244:8080
216.139.123.119:80
120.150.60.189:80
219.75.128.166:80
68.188.112.97:80
107.5.122.110:80
87.106.139.101:8080
46.105.131.79:8080
82.80.155.43:80
Signatures
-
resource yara_rule behavioral1/memory/1148-0-0x0000000000400000-0x0000000000410000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1148 rundll32.exe 1148 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1148 1820 rundll32.exe 28 PID 1820 wrote to memory of 1148 1820 rundll32.exe 28 PID 1820 wrote to memory of 1148 1820 rundll32.exe 28 PID 1820 wrote to memory of 1148 1820 rundll32.exe 28 PID 1820 wrote to memory of 1148 1820 rundll32.exe 28 PID 1820 wrote to memory of 1148 1820 rundll32.exe 28 PID 1820 wrote to memory of 1148 1820 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\712360d329726db960b735a9ea26c1faaab33b2e4b8e0b567d61adb41e006badN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\712360d329726db960b735a9ea26c1faaab33b2e4b8e0b567d61adb41e006badN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1148
-