Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
24e354b7161003755dfbd642a5db1444b6355101e5ef482bd5589fd76909f5e5.dll
Resource
win7-20240903-en
General
-
Target
24e354b7161003755dfbd642a5db1444b6355101e5ef482bd5589fd76909f5e5.dll
-
Size
658KB
-
MD5
6823a9f6d331526e28e9e6f69c28aba3
-
SHA1
523539ba4738eaa9793eefb24873e1b0d32cbf5e
-
SHA256
24e354b7161003755dfbd642a5db1444b6355101e5ef482bd5589fd76909f5e5
-
SHA512
24f64acfe36474a91808e8399d45b93db50f6b1bd74dadb00a40791f1196ba8fa1a70cad02ae19cc41546e2ad826f503baba88a9c67ff1d582f47e4942ca557a
-
SSDEEP
12288:V4wcc2MydZgRd9aa8l85Qr0t6DZ32QcbplMyVJqhpgyXBaZe+yEltg/BQ4LJlnfp:V4wcc2WRd9aaKDhAkyVJ4paZAnJln1kI
Malware Config
Extracted
emotet
Epoch5
175.126.176.79:8080
165.22.254.68:443
116.124.128.206:8080
202.29.239.162:443
103.71.99.57:8080
88.217.172.165:8080
93.104.209.107:8080
104.244.79.94:443
196.44.98.190:8080
85.214.67.203:8080
85.25.120.45:8080
54.37.228.122:443
103.41.204.169:8080
165.232.185.110:8080
195.77.239.39:8080
36.67.23.59:443
59.148.253.194:443
103.85.95.4:8080
157.230.99.206:8080
139.196.72.155:8080
54.37.106.167:8080
118.98.72.86:443
188.225.32.231:4143
103.126.216.86:443
78.47.204.80:443
103.56.149.105:8080
202.28.34.99:8080
210.57.209.142:8080
165.22.254.236:8080
87.106.97.83:7080
198.199.70.22:8080
37.44.244.177:8080
104.248.225.227:8080
68.183.91.111:8080
64.227.55.231:8080
157.245.111.0:8080
62.171.178.147:8080
103.254.12.236:7080
202.134.4.210:7080
103.224.241.74:8080
178.62.112.199:8080
128.199.217.206:443
Signatures
-
Emotet family
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3012 regsvr32.exe 2556 regsvr32.exe 2556 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3012 regsvr32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2556 3012 regsvr32.exe 30 PID 3012 wrote to memory of 2556 3012 regsvr32.exe 30 PID 3012 wrote to memory of 2556 3012 regsvr32.exe 30 PID 3012 wrote to memory of 2556 3012 regsvr32.exe 30 PID 3012 wrote to memory of 2556 3012 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\24e354b7161003755dfbd642a5db1444b6355101e5ef482bd5589fd76909f5e5.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlqzXgpVOwpEXX\pdSQHfLVBgB.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-