Analysis
-
max time kernel
96s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll
Resource
win7-20240903-en
General
-
Target
60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll
-
Size
1.0MB
-
MD5
5407a076d3e9cb302ce70bb986aaaced
-
SHA1
e7cf16463cc36e898a8e53f04f3b9fd7aa50c149
-
SHA256
60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403
-
SHA512
034b7b3e8348903591090fd55cedd47277903c80a50f8574eff16029c143100888b4ccf8dd6b87b205b3c80c9a31bc92eb76eb67247dd1bed964a437098ea14b
-
SSDEEP
24576:UkQzNzQdg6wflGfm8WYYG7uA5tQ8L5iT6:xQyw9/8WKtQk5iT6
Malware Config
Extracted
emotet
Epoch4
172.104.227.98:443
31.207.89.74:8080
46.55.222.11:443
41.76.108.46:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
203.114.109.124:443
45.118.115.99:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
192.254.71.210:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Emotet family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1820 wrote to memory of 796 1820 regsvr32.exe 83 PID 1820 wrote to memory of 796 1820 regsvr32.exe 83 PID 1820 wrote to memory of 796 1820 regsvr32.exe 83 PID 796 wrote to memory of 2308 796 regsvr32.exe 84 PID 796 wrote to memory of 2308 796 regsvr32.exe 84 PID 796 wrote to memory of 2308 796 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\60f1625f579a3bc6798a8d2c56bc75ea17555a95b6fe0078374c61c394e27403.dll",DllRegisterServer3⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-