Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
411254341a8002ac4f949ea64e37544dc20272fdd45e2bd2ad42b7dd6bc9863c.dll
Resource
win7-20240903-en
General
-
Target
411254341a8002ac4f949ea64e37544dc20272fdd45e2bd2ad42b7dd6bc9863c.dll
-
Size
810KB
-
MD5
f77134ef95c75df2c24ef08df7ce5309
-
SHA1
c3383ddd8c36fb2e5290ef45586489fbb6f838e5
-
SHA256
411254341a8002ac4f949ea64e37544dc20272fdd45e2bd2ad42b7dd6bc9863c
-
SHA512
8e7d150b9f4687bfecc2ecdac9302d329ebf86b7329d8d357d911ed69b9b015ef8ce409024c973b2cbf7a926c4bcb63842125e52a2ecd170986eb9ce534c51aa
-
SSDEEP
12288:5e62IbUp6cgHVysjTEs0auETHl4GbOX4NNVjmFuu4I7Sk4BwhWyy6W0WTbhEQ:5e6T06hHXEYHl4GbOX4NN0V77syET9E
Malware Config
Extracted
emotet
Epoch4
172.104.227.98:443
31.207.89.74:8080
46.55.222.11:443
41.76.108.46:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
203.114.109.124:443
45.118.115.99:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
192.254.71.210:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Emotet family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2292 2512 regsvr32.exe 30 PID 2512 wrote to memory of 2292 2512 regsvr32.exe 30 PID 2512 wrote to memory of 2292 2512 regsvr32.exe 30 PID 2512 wrote to memory of 2292 2512 regsvr32.exe 30 PID 2512 wrote to memory of 2292 2512 regsvr32.exe 30 PID 2512 wrote to memory of 2292 2512 regsvr32.exe 30 PID 2512 wrote to memory of 2292 2512 regsvr32.exe 30 PID 2292 wrote to memory of 2208 2292 regsvr32.exe 31 PID 2292 wrote to memory of 2208 2292 regsvr32.exe 31 PID 2292 wrote to memory of 2208 2292 regsvr32.exe 31 PID 2292 wrote to memory of 2208 2292 regsvr32.exe 31 PID 2292 wrote to memory of 2208 2292 regsvr32.exe 31 PID 2292 wrote to memory of 2208 2292 regsvr32.exe 31 PID 2292 wrote to memory of 2208 2292 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\411254341a8002ac4f949ea64e37544dc20272fdd45e2bd2ad42b7dd6bc9863c.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\411254341a8002ac4f949ea64e37544dc20272fdd45e2bd2ad42b7dd6bc9863c.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\411254341a8002ac4f949ea64e37544dc20272fdd45e2bd2ad42b7dd6bc9863c.dll",DllRegisterServer3⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-