Analysis
-
max time kernel
94s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
e6ca6140f1ae9094c7eed9d7954b0a17be813241c9455d6eaca10c615554b4dc.dll
Resource
win7-20240903-en
General
-
Target
e6ca6140f1ae9094c7eed9d7954b0a17be813241c9455d6eaca10c615554b4dc.dll
-
Size
258KB
-
MD5
10d4ccdcde2fa3436f48bf60f5174462
-
SHA1
57ba9e03e61f206f0f10eda750494816daa9602f
-
SHA256
e6ca6140f1ae9094c7eed9d7954b0a17be813241c9455d6eaca10c615554b4dc
-
SHA512
62ebfeedb98751461cdf61041456d33ea6aa089aa5e98fc7a7508055f87923fce5e5931c0ec4090586c3b514ac4500ae381af758438b17c7e49389c705936f4f
-
SSDEEP
6144:GPMd2FdFQ+PMRm/Z8ezVSbpz6LcZ5Fl9EppXxqJVHWTBnVpv:WQ2d86q0VSN6LcZ5Fl9EAWTHpv
Malware Config
Extracted
emotet
Epoch5
209.239.112.82:8080
116.124.128.206:8080
45.63.5.129:443
128.199.192.135:8080
51.178.61.60:443
168.197.250.14:80
177.72.80.14:7080
51.210.242.234:8080
142.4.219.173:8080
78.47.204.80:443
78.46.73.125:443
37.44.244.177:8080
37.59.209.141:8080
104.131.62.48:8080
190.90.233.66:443
185.148.168.220:8080
185.148.168.15:8080
62.171.178.147:8080
191.252.103.16:80
54.38.242.185:443
85.214.67.203:8080
217.182.143.207:443
159.69.237.188:443
210.57.209.142:8080
54.37.228.122:443
207.148.81.119:8080
195.77.239.39:8080
66.42.57.149:443
195.154.146.35:443
Signatures
-
Emotet family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exerundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 452 wrote to memory of 2204 452 regsvr32.exe regsvr32.exe PID 452 wrote to memory of 2204 452 regsvr32.exe regsvr32.exe PID 452 wrote to memory of 2204 452 regsvr32.exe regsvr32.exe PID 2204 wrote to memory of 2308 2204 regsvr32.exe rundll32.exe PID 2204 wrote to memory of 2308 2204 regsvr32.exe rundll32.exe PID 2204 wrote to memory of 2308 2204 regsvr32.exe rundll32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e6ca6140f1ae9094c7eed9d7954b0a17be813241c9455d6eaca10c615554b4dc.dll1⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e6ca6140f1ae9094c7eed9d7954b0a17be813241c9455d6eaca10c615554b4dc.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\e6ca6140f1ae9094c7eed9d7954b0a17be813241c9455d6eaca10c615554b4dc.dll",DllRegisterServer3⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-