Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 17:49 UTC
Static task
static1
Behavioral task
behavioral1
Sample
feed199d881bf81988cf09377815c87479d8467bf24d66dc7172cb2f31f5c029.dll
Resource
win7-20241010-en
General
-
Target
feed199d881bf81988cf09377815c87479d8467bf24d66dc7172cb2f31f5c029.dll
-
Size
887KB
-
MD5
ef487a16129eb5dcc4e1a3598d4ab025
-
SHA1
3ee5b3d2b80970be0c981cad0c13f3018d251695
-
SHA256
feed199d881bf81988cf09377815c87479d8467bf24d66dc7172cb2f31f5c029
-
SHA512
0d31c9f2a1b575f75920c328f5247387917d15622f1f4bf1ea62ab42f2e0884d3189c12955b77fcd9936c225e48979ec2adc4761d212c4d3a3f4232760534787
-
SSDEEP
12288:A0BQgtzAxM8q6BkmkxisTsxwJzCQ6TZ56lu4Vp4y1F9SFXCwQobk:Ar6zAxVq6Bkm7saIzCXTZxUJFcF
Malware Config
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Emotet family
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 848 regsvr32.exe 848 regsvr32.exe 2928 regsvr32.exe 2928 regsvr32.exe 2928 regsvr32.exe 2928 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 848 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 848 wrote to memory of 2928 848 regsvr32.exe 85 PID 848 wrote to memory of 2928 848 regsvr32.exe 85
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\feed199d881bf81988cf09377815c87479d8467bf24d66dc7172cb2f31f5c029.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\XYBkysGeaDus\uLKR.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request219.135.221.88.in-addr.arpaIN PTRResponse219.135.221.88.in-addr.arpaIN PTRa88-221-135-219deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request140.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.86.104.in-addr.arpaIN PTRResponse41.110.86.104.in-addr.arpaIN PTRa104-86-110-41deploystaticakamaitechnologiescom
-
Remote address:218.38.121.17:443RequestGET / HTTP/1.1
Connection: Keep-Alive
Cookie: QdW=cVidc4Detpdd4mjhUZaGb2h/cXKt+V4oUtc7PXuQVKeTPZercmVnygTpXQefPAG0E2UrYLAJUpnAkHnIn3oxVIYun389gR/SWHF6QvsdCOJb2kG3MELM4GracfIQmRjXxPRJA7B1kRrK8VkCUjaRXQdR2/2r9MBuevrdhDEvfhN4bEhhEfNK51NROH8TCANobnhx3hESCLtqe+NiLHYAzPbUMk82DfS/JVU+Nu4oT+AhoDcudczaH/uM07GlzzcSvpNqD8J7jAayVyQBza02/dgObxD7qSG9ZLXULIhTIbl/13PmS0jQIu6hxjSKGh0HI9xqenHxP3s=
Host: 218.38.121.17
-
Remote address:8.8.8.8:53Request17.121.38.218.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request218.135.221.88.in-addr.arpaIN PTRResponse218.135.221.88.in-addr.arpaIN PTRa88-221-135-218deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request101.209.201.84.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
1.0kB 1.9kB 8 6
HTTP Request
GET https://218.38.121.17/ -
260 B 200 B 5 5
-
208 B 4
-
208 B 4
-
208 B 4
-
260 B 200 B 5 5
-
260 B 160 B 5 4
-
260 B 200 B 5 5
-
156 B 3
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
219.135.221.88.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
140.32.126.40.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
41.110.86.104.in-addr.arpa
-
72 B 143 B 1 1
DNS Request
17.121.38.218.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
218.135.221.88.in-addr.arpa
-
73 B 133 B 1 1
DNS Request
101.209.201.84.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa