Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll
Resource
win7-20240903-en
General
-
Target
60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll
-
Size
1.0MB
-
MD5
5407a076d3e9cb302ce70bb986aaaced
-
SHA1
e7cf16463cc36e898a8e53f04f3b9fd7aa50c149
-
SHA256
60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403
-
SHA512
034b7b3e8348903591090fd55cedd47277903c80a50f8574eff16029c143100888b4ccf8dd6b87b205b3c80c9a31bc92eb76eb67247dd1bed964a437098ea14b
-
SSDEEP
24576:UkQzNzQdg6wflGfm8WYYG7uA5tQ8L5iT6:xQyw9/8WKtQk5iT6
Malware Config
Extracted
emotet
Epoch4
172.104.227.98:443
31.207.89.74:8080
46.55.222.11:443
41.76.108.46:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
203.114.109.124:443
45.118.115.99:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
192.254.71.210:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Emotet family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exeregsvr32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid Process procid_target PID 2156 wrote to memory of 1788 2156 regsvr32.exe 30 PID 2156 wrote to memory of 1788 2156 regsvr32.exe 30 PID 2156 wrote to memory of 1788 2156 regsvr32.exe 30 PID 2156 wrote to memory of 1788 2156 regsvr32.exe 30 PID 2156 wrote to memory of 1788 2156 regsvr32.exe 30 PID 2156 wrote to memory of 1788 2156 regsvr32.exe 30 PID 2156 wrote to memory of 1788 2156 regsvr32.exe 30 PID 1788 wrote to memory of 2352 1788 regsvr32.exe 31 PID 1788 wrote to memory of 2352 1788 regsvr32.exe 31 PID 1788 wrote to memory of 2352 1788 regsvr32.exe 31 PID 1788 wrote to memory of 2352 1788 regsvr32.exe 31 PID 1788 wrote to memory of 2352 1788 regsvr32.exe 31 PID 1788 wrote to memory of 2352 1788 regsvr32.exe 31 PID 1788 wrote to memory of 2352 1788 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll",DllRegisterServer3⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-