Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 19:08

General

  • Target

    b3a0c9616e22a36294fa06345772aeff116f2655c79ab29bf5f474aed7e1d1f4N.dll

  • Size

    580KB

  • MD5

    1182aabb11f0c7f51dc8b1ce421ded30

  • SHA1

    7458831466719feacc70fea3c40a8f4e54bff520

  • SHA256

    b3a0c9616e22a36294fa06345772aeff116f2655c79ab29bf5f474aed7e1d1f4

  • SHA512

    698cc4fe76c1691e3ab06a1307f7597233b7d48d285d83269480f71067e2dd38a6d645c29efdc0ce9cfa9ca7c4e59ff7b11d4746eb0bbd79eb316a1a90bea338

  • SSDEEP

    12288:BxhJ10GoRCjAK+NbAItxNQlZLujv54pkCiAX:BDTxPSAExNpjvj2X

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

184.66.18.83:80

202.187.222.40:80

167.71.148.58:443

211.215.18.93:8080

1.234.65.61:80

80.15.100.37:80

155.186.9.160:80

172.104.169.32:8080

110.39.162.2:443

12.162.84.2:8080

181.136.190.86:80

68.183.190.199:8080

191.223.36.170:80

190.45.24.210:80

81.213.175.132:80

181.120.29.49:80

82.76.111.249:443

177.23.7.151:80

95.76.153.115:80

93.148.247.169:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Blocklisted process makes network request 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b3a0c9616e22a36294fa06345772aeff116f2655c79ab29bf5f474aed7e1d1f4N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b3a0c9616e22a36294fa06345772aeff116f2655c79ab29bf5f474aed7e1d1f4N.dll,#1
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2796-0-0x0000000000230000-0x0000000000252000-memory.dmp

    Filesize

    136KB