Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
ca0e46d748b2c12a2c077275af2c47b72935992c93b70f0652dbea75c97c11f3.dll
Resource
win7-20241023-en
General
-
Target
ca0e46d748b2c12a2c077275af2c47b72935992c93b70f0652dbea75c97c11f3.dll
-
Size
1004KB
-
MD5
30b73606f8cb58ac25786a2b6e8d396a
-
SHA1
7bbfa994acfa271099eddd2f3103c1150aee3103
-
SHA256
ca0e46d748b2c12a2c077275af2c47b72935992c93b70f0652dbea75c97c11f3
-
SHA512
acb5562d5e824fe6d43477cb7ab1b297b6fae76c9b03efbd9b9d4752d45ba3428c88510a814a12273bf8a8886a594870cc9158ec1701f56d0ac08b1dce644e3a
-
SSDEEP
12288:+LDlVD0Fj+g1dEJgcIzQHBKeWZlQe5tFjNRLU:Ci6fgcIcHB8Z1bLU
Malware Config
Extracted
emotet
Epoch5
168.119.39.118:443
185.168.130.138:443
168.197.250.14:80
195.77.239.39:8080
68.183.93.250:443
185.184.25.78:8080
118.98.72.86:443
78.47.204.80:443
159.69.237.188:443
61.7.231.226:443
103.41.204.169:8080
207.148.81.119:8080
85.214.67.203:8080
190.90.233.66:443
191.252.103.16:80
93.104.209.107:8080
194.9.172.107:8080
66.42.57.149:443
59.148.253.194:443
62.171.178.147:8080
139.196.72.155:8080
198.199.98.78:8080
185.148.168.15:8080
195.154.146.35:443
104.131.62.48:8080
37.44.244.177:8080
217.182.143.207:443
54.38.242.185:443
185.148.168.220:8080
203.153.216.46:443
87.106.97.83:7080
78.46.73.125:443
54.37.106.167:8080
37.59.209.141:8080
54.37.228.122:443
61.7.231.229:443
45.71.195.104:8080
116.124.128.206:8080
128.199.192.135:8080
210.57.209.142:8080
Signatures
-
Emotet family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
regsvr32.exepid process 2592 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2624 wrote to memory of 2592 2624 regsvr32.exe regsvr32.exe PID 2624 wrote to memory of 2592 2624 regsvr32.exe regsvr32.exe PID 2624 wrote to memory of 2592 2624 regsvr32.exe regsvr32.exe PID 2624 wrote to memory of 2592 2624 regsvr32.exe regsvr32.exe PID 2624 wrote to memory of 2592 2624 regsvr32.exe regsvr32.exe PID 2624 wrote to memory of 2592 2624 regsvr32.exe regsvr32.exe PID 2624 wrote to memory of 2592 2624 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ca0e46d748b2c12a2c077275af2c47b72935992c93b70f0652dbea75c97c11f3.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ca0e46d748b2c12a2c077275af2c47b72935992c93b70f0652dbea75c97c11f3.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592
-