Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
c5401eb078571bf9e68935912fcf829bfa7d958344496d5d81b0f0efd449f60e.dll
Resource
win7-20240903-en
General
-
Target
c5401eb078571bf9e68935912fcf829bfa7d958344496d5d81b0f0efd449f60e.dll
-
Size
531KB
-
MD5
6c7f96f3793674521ab35c30b6d3cc18
-
SHA1
9bab5239a7e494b5f3cb4b46453d83990759a329
-
SHA256
c5401eb078571bf9e68935912fcf829bfa7d958344496d5d81b0f0efd449f60e
-
SHA512
b31f5875ed4b75d43c269617ae87d1f942ee5df2a14f1f575ec473d9ef775b7a3ecc4f5815872056fe65a3bf3db5679628fb34cfe5653fcc25d0557e3daf0763
-
SSDEEP
12288:zI3OyyTrBVuhjecqtEKmtcrcAFcqXm44FBr:zLluhantEK3cAyqXm44FBr
Malware Config
Extracted
emotet
Epoch5
78.47.204.80:443
62.171.178.147:8080
165.232.185.110:8080
103.41.204.169:8080
54.37.228.122:443
202.29.239.162:443
103.71.99.57:8080
64.227.55.231:8080
85.214.67.203:8080
139.196.72.155:8080
195.77.239.39:8080
202.28.34.99:8080
54.37.106.167:8080
103.126.216.86:443
68.183.91.111:8080
104.244.79.94:443
85.25.120.45:8080
116.124.128.206:8080
210.57.209.142:8080
103.85.95.4:8080
188.225.32.231:4143
118.98.72.86:443
37.44.244.177:8080
87.106.97.83:7080
103.56.149.105:8080
128.199.217.206:443
103.254.12.236:7080
59.148.253.194:443
36.67.23.59:443
202.134.4.210:7080
196.44.98.190:8080
178.62.112.199:8080
103.224.241.74:8080
157.245.111.0:8080
104.248.225.227:8080
93.104.209.107:8080
88.217.172.165:8080
175.126.176.79:8080
157.230.99.206:8080
Signatures
-
Emotet family
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2904 regsvr32.exe 1648 regsvr32.exe 1648 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 2904 regsvr32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2904 wrote to memory of 1648 2904 regsvr32.exe regsvr32.exe PID 2904 wrote to memory of 1648 2904 regsvr32.exe regsvr32.exe PID 2904 wrote to memory of 1648 2904 regsvr32.exe regsvr32.exe PID 2904 wrote to memory of 1648 2904 regsvr32.exe regsvr32.exe PID 2904 wrote to memory of 1648 2904 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c5401eb078571bf9e68935912fcf829bfa7d958344496d5d81b0f0efd449f60e.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\LtbMFmlhuTs\zyXBvh.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-