Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll
Resource
win7-20240903-en
General
-
Target
24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll
-
Size
696KB
-
MD5
dbfe774ce190463bc5e770bd4ef7e5d3
-
SHA1
b3aef9b46d595a3ede9769a721e9f7640998ed4d
-
SHA256
24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a
-
SHA512
e479aa52cff62f67b8e010929d0a392915c809a1363b808297ea7a2f07f3716d23ff376472f5dc24b08e2dfbb9ce09b53e821a47a2c3aa72aba03ba3cbafe6ef
-
SSDEEP
12288:WKEUkuAOLka1miSmuYr1V7+AobS3qTHPR101D:TEQLka1nBViAoS3WvR
Malware Config
Extracted
emotet
Epoch5
51.178.61.60:443
168.197.250.14:80
45.79.33.48:8080
196.44.98.190:8080
177.72.80.14:7080
51.210.242.234:8080
185.148.169.10:8080
142.4.219.173:8080
78.47.204.80:443
78.46.73.125:443
37.44.244.177:8080
37.59.209.141:8080
191.252.103.16:80
54.38.242.185:443
85.214.67.203:8080
54.37.228.122:443
207.148.81.119:8080
195.77.239.39:8080
66.42.57.149:443
195.154.146.35:443
Signatures
-
Emotet family
-
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 16 3584 rundll32.exe 22 3584 rundll32.exe 23 3584 rundll32.exe 37 3584 rundll32.exe 41 3584 rundll32.exe 46 3584 rundll32.exe 48 3584 rundll32.exe 49 3584 rundll32.exe 50 3584 rundll32.exe 52 3584 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3584 rundll32.exe 3584 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2080 wrote to memory of 2456 2080 rundll32.exe rundll32.exe PID 2080 wrote to memory of 2456 2080 rundll32.exe rundll32.exe PID 2080 wrote to memory of 2456 2080 rundll32.exe rundll32.exe PID 2456 wrote to memory of 3584 2456 rundll32.exe rundll32.exe PID 2456 wrote to memory of 3584 2456 rundll32.exe rundll32.exe PID 2456 wrote to memory of 3584 2456 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\24c784291ebd33cfa02adcf8b6777886d545d80f25bcb78e262de01e9f76bb2a.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-