Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
21c420d5703369d8b9810cdebc2102cbfa1db368b382e671ad7dbe7982ebdcfe.dll
Resource
win7-20240903-en
General
-
Target
21c420d5703369d8b9810cdebc2102cbfa1db368b382e671ad7dbe7982ebdcfe.dll
-
Size
262KB
-
MD5
4f6bbc8c080bfb840572be492c3a2d7a
-
SHA1
403a0fd1513e71c69fca5b36717d981d0d07d4d8
-
SHA256
21c420d5703369d8b9810cdebc2102cbfa1db368b382e671ad7dbe7982ebdcfe
-
SHA512
024627625bc5ef8d80c99d86fc55301d10a181ea1b135b9ed53ce13f9e28cf3dfcf188c71e8731adbcfcf6801ca9e1bb2710de9571896b1b1f8c12877eaf2454
-
SSDEEP
6144:WveDflm0NLph6TZm1T3MHL+rF6l5ER0lBr/lQWTBdmgL/S:Wvef8+h61mRcHL+rF6l5EAQWTFL/S
Malware Config
Extracted
emotet
Epoch4
172.104.227.98:443
31.207.89.74:8080
46.55.222.11:443
41.76.108.46:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
203.114.109.124:443
45.118.115.99:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
192.254.71.210:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Emotet family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 924 wrote to memory of 3284 924 regsvr32.exe 82 PID 924 wrote to memory of 3284 924 regsvr32.exe 82 PID 924 wrote to memory of 3284 924 regsvr32.exe 82 PID 3284 wrote to memory of 4000 3284 regsvr32.exe 83 PID 3284 wrote to memory of 4000 3284 regsvr32.exe 83 PID 3284 wrote to memory of 4000 3284 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\21c420d5703369d8b9810cdebc2102cbfa1db368b382e671ad7dbe7982ebdcfe.dll1⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\21c420d5703369d8b9810cdebc2102cbfa1db368b382e671ad7dbe7982ebdcfe.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\21c420d5703369d8b9810cdebc2102cbfa1db368b382e671ad7dbe7982ebdcfe.dll",DllRegisterServer3⤵
- System Location Discovery: System Language Discovery
PID:4000
-
-