Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 00:46
Behavioral task
behavioral1
Sample
906798bca75050b212bbd86a7ef76902dbfbb09b2581220516128e3bb458250a.dll
Resource
win7-20240903-en
General
-
Target
906798bca75050b212bbd86a7ef76902dbfbb09b2581220516128e3bb458250a.dll
-
Size
57KB
-
MD5
286d8a826e1c662fd15af99cb487bb16
-
SHA1
05a9d083147226d1581927d81efbd4c29235547a
-
SHA256
906798bca75050b212bbd86a7ef76902dbfbb09b2581220516128e3bb458250a
-
SHA512
e6785872ed0a01bccdb539ecc67ff17bfd645001e6426a1222450f00148bc1dfa4ea98f9f7447579172e8dff89c2c39c2990f8514b2922eec31f150ca5fa7575
-
SSDEEP
1536:3nWXeV9s1QKDmYKbUO+qO/pmUx+VT0ypopk:lAvmY4YseW0U+
Malware Config
Extracted
emotet
Epoch3
223.133.20.171:80
45.79.16.230:7080
145.239.169.32:7080
190.85.46.52:7080
58.27.215.3:8080
220.147.247.145:80
139.59.12.63:8080
185.142.236.163:443
113.156.82.32:80
126.126.139.26:443
198.57.203.63:8080
181.137.229.1:80
95.216.205.155:8080
37.187.100.220:7080
50.116.78.109:8080
37.205.9.252:7080
172.105.78.244:8080
103.133.66.57:443
91.75.75.46:80
46.105.131.68:8080
181.122.154.240:80
79.133.6.236:8080
74.208.173.91:8080
172.96.190.154:8080
187.189.66.200:8080
179.5.118.12:80
190.190.15.20:80
157.7.164.178:8081
5.79.70.250:8080
36.91.44.183:80
202.188.218.82:80
67.121.104.51:20
119.92.77.17:80
200.120.241.238:80
77.74.78.80:443
113.193.239.51:443
103.48.68.173:80
178.33.167.120:8080
117.247.235.44:80
143.95.101.72:8080
8.4.9.137:8080
203.153.216.178:7080
113.160.248.110:80
41.212.89.128:80
115.79.195.246:80
91.83.93.103:443
180.26.62.115:443
78.114.175.216:80
192.241.220.183:8080
45.177.120.37:8080
221.184.46.216:80
185.86.148.68:443
46.32.229.152:8080
37.210.220.95:80
190.194.12.132:80
113.161.148.81:80
75.127.14.170:8080
51.38.201.19:7080
115.78.11.155:80
192.163.221.191:8080
182.227.240.189:443
223.17.215.76:80
88.247.58.26:80
182.253.83.234:7080
120.51.34.254:80
103.229.73.17:8080
41.185.29.128:8080
185.208.226.142:8080
2.144.244.204:80
54.38.143.245:8080
189.160.188.97:80
37.46.129.215:8080
192.210.217.94:8080
189.150.209.206:80
202.166.170.43:80
138.201.45.2:8080
202.153.220.157:80
167.71.227.113:8080
157.245.138.101:7080
162.144.42.60:8080
60.125.114.64:443
103.80.51.61:8080
128.106.187.110:80
80.200.62.81:20
190.101.48.116:80
116.202.10.123:8080
76.18.16.210:80
195.201.56.70:8080
Signatures
-
resource yara_rule behavioral1/memory/2860-0-0x0000000000170000-0x0000000000180000-memory.dmp emotet -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2860 rundll32.exe 2860 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2860 2844 rundll32.exe 30 PID 2844 wrote to memory of 2860 2844 rundll32.exe 30 PID 2844 wrote to memory of 2860 2844 rundll32.exe 30 PID 2844 wrote to memory of 2860 2844 rundll32.exe 30 PID 2844 wrote to memory of 2860 2844 rundll32.exe 30 PID 2844 wrote to memory of 2860 2844 rundll32.exe 30 PID 2844 wrote to memory of 2860 2844 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\906798bca75050b212bbd86a7ef76902dbfbb09b2581220516128e3bb458250a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\906798bca75050b212bbd86a7ef76902dbfbb09b2581220516128e3bb458250a.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860
-