Analysis Overview
SHA256
2d23008797a22adef86f59f17fa9f5cd3a0d11cef3d4f367bac93d27f4da9154
Threat Level: Known bad
The file 2d23008797a22adef86f59f17fa9f5cd3a0d11cef3d4f367bac93d27f4da9154 was found to be: Known bad.
Malicious Activity Summary
Emotet
Emotet family
Loads dropped DLL
Drops file in System32 directory
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-13 18:09
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-13 18:09
Reported
2024-11-13 18:12
Platform
win7-20240903-en
Max time kernel
149s
Max time network
155s
Command Line
Signatures
Emotet
Emotet family
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\Kioznzaxvlc\edtigsevpif.hir | C:\Windows\SysWOW64\regsvr32.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\12c5ca2053e268d0003cba9e8b89220f876ee482cd283a5382be0ee713083185.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\12c5ca2053e268d0003cba9e8b89220f876ee482cd283a5382be0ee713083185.dll
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Kioznzaxvlc\edtigsevpif.hir"
Network
| Country | Destination | Domain | Proto |
| PL | 46.41.130.218:8080 | tcp | |
| PL | 46.41.130.218:8080 | tcp | |
| AR | 168.197.250.14:80 | tcp | |
| AR | 168.197.250.14:80 | tcp | |
| ES | 195.77.239.39:8080 | tcp | |
| ES | 195.77.239.39:8080 | tcp | |
| ID | 210.57.209.142:8080 | tcp | |
| ID | 210.57.209.142:8080 | tcp | |
| ID | 203.153.216.46:443 | tcp |
Files
memory/2396-0-0x0000000000970000-0x0000000000995000-memory.dmp
memory/2396-3-0x0000000010000000-0x00000000100A9000-memory.dmp
memory/2340-4-0x00000000003E0000-0x0000000000405000-memory.dmp
memory/2340-8-0x0000000010000000-0x00000000100A9000-memory.dmp
memory/2340-9-0x0000000010000000-0x00000000100A9000-memory.dmp
memory/2340-15-0x0000000010000000-0x00000000100A9000-memory.dmp
memory/2340-19-0x0000000010000000-0x00000000100A9000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-13 18:09
Reported
2024-11-13 18:12
Platform
win10v2004-20241007-en
Max time kernel
136s
Max time network
144s
Command Line
Signatures
Emotet
Emotet family
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\Yrupyd\lmktaisfbrae.iim | C:\Windows\SysWOW64\regsvr32.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1792 wrote to memory of 4960 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1792 wrote to memory of 4960 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1792 wrote to memory of 4960 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 4960 wrote to memory of 4608 | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 4960 wrote to memory of 4608 | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 4960 wrote to memory of 4608 | N/A | C:\Windows\SysWOW64\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\12c5ca2053e268d0003cba9e8b89220f876ee482cd283a5382be0ee713083185.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\12c5ca2053e268d0003cba9e8b89220f876ee482cd283a5382be0ee713083185.dll
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Yrupyd\lmktaisfbrae.iim"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| PL | 46.41.130.218:8080 | tcp | |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| AR | 168.197.250.14:80 | tcp | |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| ES | 195.77.239.39:8080 | tcp | |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 92.12.20.2.in-addr.arpa | udp |
| ID | 210.57.209.142:8080 | tcp | |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| ID | 203.153.216.46:443 | tcp | |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| BR | 45.71.195.104:8080 | tcp | |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| DE | 185.148.168.15:8080 | tcp | |
| DE | 78.46.73.125:443 | tcp |
Files
memory/4960-0-0x00000000029E0000-0x0000000002A05000-memory.dmp
memory/4960-3-0x0000000010000000-0x00000000100A9000-memory.dmp
C:\Windows\SysWOW64\Yrupyd\lmktaisfbrae.iim
| MD5 | 42365e836f1ca9b7bb57fd254070ef4b |
| SHA1 | b1c46d683f59efb06daab841341b9a56fff12baf |
| SHA256 | 12c5ca2053e268d0003cba9e8b89220f876ee482cd283a5382be0ee713083185 |
| SHA512 | 1c8f9c427044cca5664f53bb282479f8c4f9c5d0bb1abc4cea68e9762d728bed2c1143877f90ab5841fd24af2595d7c8c090bb3613774d84e8675e31f05c921f |
memory/4608-5-0x0000000002180000-0x00000000021A5000-memory.dmp