Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
a74b09f6c976c8b4f2637715cfc9f3015c72a7891b009337c9a1d1b914357879.dll
Resource
win7-20240903-en
General
-
Target
a74b09f6c976c8b4f2637715cfc9f3015c72a7891b009337c9a1d1b914357879.dll
-
Size
696KB
-
MD5
4f550b6088d36367ee8c3c5b0cba1d77
-
SHA1
49e380d232af331f8e80c888f0122842429f34da
-
SHA256
a74b09f6c976c8b4f2637715cfc9f3015c72a7891b009337c9a1d1b914357879
-
SHA512
d28ee7f6c98545768dd559c9ba1ca45143cc7fae94bc2ace6214d454854b6a8de6823d760c160d2bc24aab64e90c699302dd7a8ca63c3d05dbd537d7ee2eb368
-
SSDEEP
12288:FqQlvIOH0GCTBHmPt4eBQhNico09cDlB4Vx/ID:0uH0GCNeQni7H0
Malware Config
Extracted
emotet
Epoch4
91.200.186.228:443
41.76.108.46:8080
188.165.214.166:7080
191.252.196.221:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Emotet family
-
Blocklisted process makes network request 15 IoCs
Processes:
rundll32.exeflow pid Process 3 2784 rundll32.exe 5 2784 rundll32.exe 8 2784 rundll32.exe 11 2784 rundll32.exe 12 2784 rundll32.exe 13 2784 rundll32.exe 14 2784 rundll32.exe 16 2784 rundll32.exe 17 2784 rundll32.exe 18 2784 rundll32.exe 19 2784 rundll32.exe 22 2784 rundll32.exe 24 2784 rundll32.exe 25 2784 rundll32.exe 26 2784 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid Process 2784 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 2644 wrote to memory of 2996 2644 rundll32.exe 30 PID 2644 wrote to memory of 2996 2644 rundll32.exe 30 PID 2644 wrote to memory of 2996 2644 rundll32.exe 30 PID 2644 wrote to memory of 2996 2644 rundll32.exe 30 PID 2644 wrote to memory of 2996 2644 rundll32.exe 30 PID 2644 wrote to memory of 2996 2644 rundll32.exe 30 PID 2644 wrote to memory of 2996 2644 rundll32.exe 30 PID 2996 wrote to memory of 2784 2996 rundll32.exe 31 PID 2996 wrote to memory of 2784 2996 rundll32.exe 31 PID 2996 wrote to memory of 2784 2996 rundll32.exe 31 PID 2996 wrote to memory of 2784 2996 rundll32.exe 31 PID 2996 wrote to memory of 2784 2996 rundll32.exe 31 PID 2996 wrote to memory of 2784 2996 rundll32.exe 31 PID 2996 wrote to memory of 2784 2996 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a74b09f6c976c8b4f2637715cfc9f3015c72a7891b009337c9a1d1b914357879.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a74b09f6c976c8b4f2637715cfc9f3015c72a7891b009337c9a1d1b914357879.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\a74b09f6c976c8b4f2637715cfc9f3015c72a7891b009337c9a1d1b914357879.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-