Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
wurod.dll
Resource
win7-20240708-en
General
-
Target
wurod.dll
-
Size
764KB
-
MD5
b9047a916a40b1c4e0033bba961f90e5
-
SHA1
557c945813815eb7b0a74b3bdbfa53a20139838a
-
SHA256
30b2392656573d4fc71a198bea4eb089047a6f21c2db7b163bcab3b1c686be3f
-
SHA512
54762cf3769b4149cea1a495a59b1c51d3db77d1d67b51249bc79806b49808335ce9a5274370ad785d17979ef97cb58cd2024fdc2e2453a260f5eeafa0f0ddc2
-
SSDEEP
12288:e1NKDzZKRpnBlD7MGVrdjF3hRcTsApSvHQdOzyK7zjwOjmSrjNwgraKRT61cKGNx:S4DzZKnH4GRGY61WN+
Malware Config
Extracted
emotet
Epoch4
209.250.246.206:443
110.232.117.186:8080
164.68.99.3:8080
119.193.124.41:7080
212.237.17.99:8080
107.182.225.142:8080
185.8.212.130:7080
153.126.146.25:7080
77.81.247.144:8080
209.126.98.206:8080
201.94.166.162:443
131.100.24.231:80
45.235.8.30:8080
213.241.20.155:443
103.43.46.182:443
129.232.188.93:443
103.132.242.26:8080
151.106.112.196:8080
45.118.115.99:8080
185.4.135.165:8080
103.70.28.102:8080
51.91.7.5:8080
27.54.89.58:8080
196.218.30.83:443
206.189.28.199:8080
91.207.28.33:8080
79.137.35.198:8080
51.254.140.238:7080
173.212.193.249:8080
203.114.109.124:443
94.23.45.86:4143
63.142.250.212:443
189.126.111.200:7080
160.16.142.56:8080
102.222.215.74:443
5.9.116.246:8080
172.104.251.154:8080
158.69.222.101:443
167.172.253.162:8080
82.165.152.127:8080
212.24.98.99:8080
197.242.150.244:8080
72.15.201.15:8080
101.50.0.91:8080
51.91.76.89:8080
183.111.227.137:8080
188.44.20.25:443
58.227.42.236:80
45.176.232.124:443
185.157.82.211:8080
163.44.196.120:8080
159.65.88.10:8080
146.59.226.45:443
1.234.2.232:8080
149.56.131.28:8080
209.97.163.214:443
46.55.222.11:443
150.95.66.124:8080
103.75.201.2:443
216.158.226.206:443
134.122.66.193:8080
1.234.21.73:7080
167.99.115.35:8080
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2700 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2916 regsvr32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2700 2916 regsvr32.exe 30 PID 2916 wrote to memory of 2700 2916 regsvr32.exe 30 PID 2916 wrote to memory of 2700 2916 regsvr32.exe 30 PID 2916 wrote to memory of 2700 2916 regsvr32.exe 30 PID 2916 wrote to memory of 2700 2916 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\wurod.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\TwEGriwmqiNVVS\wqCHWviClm.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-