Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 19:59

General

  • Target

    1df5138acb387216741f22afe111c83854dfafae0d1617d49e051702b1237910.dll

  • Size

    543KB

  • MD5

    db07b7adac35be2509540acd51da78b9

  • SHA1

    d60dd6d9f675b1307f4e146e10f2804ce7476778

  • SHA256

    1df5138acb387216741f22afe111c83854dfafae0d1617d49e051702b1237910

  • SHA512

    a5fc4c8a2f15c9cea708cc2143582d18d4790679ec0237907e50690b9181e62d5bbf068957bd9fcec575c83d9fb77e0c01d87533e8b599d895945ed73112c58b

  • SSDEEP

    6144:JhZ02GdOOgPY4KUUAKM4cLuCKhS4OzJ1fyoogcK1GF2sD18e2k6SV4s68dTcEgDX:JhFfPKRM4c6CeOFzLcQUZvqXmI4For

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

176.31.73.90:443

45.76.159.214:8080

138.197.147.101:443

104.168.154.79:8080

149.56.131.28:8080

5.9.116.246:8080

77.81.247.144:8080

172.104.251.154:8080

50.30.40.196:8080

173.212.193.249:8080

51.91.76.89:8080

197.242.150.244:8080

103.75.201.2:443

51.254.140.238:7080

79.137.35.198:8080

72.15.201.15:8080

27.54.89.58:8080

189.126.111.200:7080

196.218.30.83:443

82.165.152.127:8080

eck1.plain
ecs1.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1df5138acb387216741f22afe111c83854dfafae0d1617d49e051702b1237910.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2636

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2636-0-0x0000000001330000-0x0000000001331000-memory.dmp

    Filesize

    4KB

  • memory/2636-1-0x0000000180000000-0x000000018002B000-memory.dmp

    Filesize

    172KB

  • memory/2636-5-0x0000000180000000-0x000000018002B000-memory.dmp

    Filesize

    172KB

  • memory/2636-6-0x000000006AB00000-0x000000006AB7F000-memory.dmp

    Filesize

    508KB

  • memory/2636-19-0x000000006AB00000-0x000000006AB7F000-memory.dmp

    Filesize

    508KB