Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll
Resource
win7-20241010-en
General
-
Target
d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll
-
Size
252KB
-
MD5
20497b5eefd6e2a5fe6c53ab6ba42211
-
SHA1
417f46c0d0b7d8491678b4dd20e5518d16ef0ac3
-
SHA256
d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464
-
SHA512
360d16a4f29ad3bf4c904c01eb9bb2bc04f1ca48f5924983a4143d8e9a76fc15332e6ae39168b23204669eaf6dd090bad53a313ae4463991c9c4e501fadcab0d
-
SSDEEP
6144:oLrMTBgGfnjcFcnwJhH4jEeyIdChWTBA3E:oLcBHZwHH4jEeAWTSE
Malware Config
Extracted
emotet
Epoch4
91.200.186.228:443
191.252.196.221:8080
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Emotet family
-
Blocklisted process makes network request 11 IoCs
flow pid Process 3 1988 rundll32.exe 7 1988 rundll32.exe 8 1988 rundll32.exe 9 1988 rundll32.exe 10 1988 rundll32.exe 11 1988 rundll32.exe 13 1988 rundll32.exe 14 1988 rundll32.exe 17 1988 rundll32.exe 18 1988 rundll32.exe 19 1988 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1988 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2948 2884 rundll32.exe 30 PID 2884 wrote to memory of 2948 2884 rundll32.exe 30 PID 2884 wrote to memory of 2948 2884 rundll32.exe 30 PID 2884 wrote to memory of 2948 2884 rundll32.exe 30 PID 2884 wrote to memory of 2948 2884 rundll32.exe 30 PID 2884 wrote to memory of 2948 2884 rundll32.exe 30 PID 2884 wrote to memory of 2948 2884 rundll32.exe 30 PID 2948 wrote to memory of 1988 2948 rundll32.exe 31 PID 2948 wrote to memory of 1988 2948 rundll32.exe 31 PID 2948 wrote to memory of 1988 2948 rundll32.exe 31 PID 2948 wrote to memory of 1988 2948 rundll32.exe 31 PID 2948 wrote to memory of 1988 2948 rundll32.exe 31 PID 2948 wrote to memory of 1988 2948 rundll32.exe 31 PID 2948 wrote to memory of 1988 2948 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-