Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll
Resource
win7-20240903-en
General
-
Target
24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll
-
Size
696KB
-
MD5
dbfe774ce190463bc5e770bd4ef7e5d3
-
SHA1
b3aef9b46d595a3ede9769a721e9f7640998ed4d
-
SHA256
24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a
-
SHA512
e479aa52cff62f67b8e010929d0a392915c809a1363b808297ea7a2f07f3716d23ff376472f5dc24b08e2dfbb9ce09b53e821a47a2c3aa72aba03ba3cbafe6ef
-
SSDEEP
12288:WKEUkuAOLka1miSmuYr1V7+AobS3qTHPR101D:TEQLka1nBViAoS3WvR
Malware Config
Extracted
emotet
Epoch5
51.178.61.60:443
168.197.250.14:80
45.79.33.48:8080
196.44.98.190:8080
177.72.80.14:7080
51.210.242.234:8080
185.148.169.10:8080
142.4.219.173:8080
78.47.204.80:443
78.46.73.125:443
37.44.244.177:8080
37.59.209.141:8080
191.252.103.16:80
54.38.242.185:443
85.214.67.203:8080
54.37.228.122:443
207.148.81.119:8080
195.77.239.39:8080
66.42.57.149:443
195.154.146.35:443
Signatures
-
Emotet family
-
Blocklisted process makes network request 9 IoCs
Processes:
rundll32.exeflow pid process 3 2760 rundll32.exe 5 2760 rundll32.exe 8 2760 rundll32.exe 9 2760 rundll32.exe 10 2760 rundll32.exe 11 2760 rundll32.exe 15 2760 rundll32.exe 18 2760 rundll32.exe 19 2760 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 2760 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2196 wrote to memory of 2656 2196 rundll32.exe rundll32.exe PID 2196 wrote to memory of 2656 2196 rundll32.exe rundll32.exe PID 2196 wrote to memory of 2656 2196 rundll32.exe rundll32.exe PID 2196 wrote to memory of 2656 2196 rundll32.exe rundll32.exe PID 2196 wrote to memory of 2656 2196 rundll32.exe rundll32.exe PID 2196 wrote to memory of 2656 2196 rundll32.exe rundll32.exe PID 2196 wrote to memory of 2656 2196 rundll32.exe rundll32.exe PID 2656 wrote to memory of 2760 2656 rundll32.exe rundll32.exe PID 2656 wrote to memory of 2760 2656 rundll32.exe rundll32.exe PID 2656 wrote to memory of 2760 2656 rundll32.exe rundll32.exe PID 2656 wrote to memory of 2760 2656 rundll32.exe rundll32.exe PID 2656 wrote to memory of 2760 2656 rundll32.exe rundll32.exe PID 2656 wrote to memory of 2760 2656 rundll32.exe rundll32.exe PID 2656 wrote to memory of 2760 2656 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-