Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll
Resource
win7-20240903-en
General
-
Target
d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll
-
Size
252KB
-
MD5
20497b5eefd6e2a5fe6c53ab6ba42211
-
SHA1
417f46c0d0b7d8491678b4dd20e5518d16ef0ac3
-
SHA256
d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464
-
SHA512
360d16a4f29ad3bf4c904c01eb9bb2bc04f1ca48f5924983a4143d8e9a76fc15332e6ae39168b23204669eaf6dd090bad53a313ae4463991c9c4e501fadcab0d
-
SSDEEP
6144:oLrMTBgGfnjcFcnwJhH4jEeyIdChWTBA3E:oLcBHZwHH4jEeAWTSE
Malware Config
Extracted
emotet
Epoch4
91.200.186.228:443
191.252.196.221:8080
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Emotet family
-
Blocklisted process makes network request 11 IoCs
Processes:
rundll32.exeflow pid process 3 2640 rundll32.exe 7 2640 rundll32.exe 8 2640 rundll32.exe 9 2640 rundll32.exe 10 2640 rundll32.exe 11 2640 rundll32.exe 13 2640 rundll32.exe 14 2640 rundll32.exe 17 2640 rundll32.exe 18 2640 rundll32.exe 19 2640 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 2640 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1672 wrote to memory of 2132 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2132 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2132 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2132 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2132 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2132 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2132 1672 rundll32.exe rundll32.exe PID 2132 wrote to memory of 2640 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 2640 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 2640 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 2640 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 2640 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 2640 2132 rundll32.exe rundll32.exe PID 2132 wrote to memory of 2640 2132 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\d410461541e22116ca0963d8c1d33f2fc8f6403033b9ccdeee35c6facbdce464.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-