Analysis

  • max time kernel
    110s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 21:18

General

  • Target

    d78748f895c6348e88e7b2f28d3fe377057ad90417dde71b5ad254a829636338N.dll

  • Size

    543KB

  • MD5

    5c20f19ccb76e15e6a3ff138bed89c20

  • SHA1

    eda9f06f13c92d207358cc8fcf5c394244c380ef

  • SHA256

    d78748f895c6348e88e7b2f28d3fe377057ad90417dde71b5ad254a829636338

  • SHA512

    847baaa7a5fc5406d2adccd1ae666922c4a7c311ac72a04b72b83d014c502741e18ff0220e60d8cd8ea51a56a99b4508cadd5c155039270222d79fd31198aa6b

  • SSDEEP

    6144:JhZ02GdOOgPYyKUUAKM4cLuCKhS4OzJ1fyoogcK1GF2sD18e2k6SV4s68dTcEgDX:JhFfdKRM4c6CeOFzLcQUZvqXmI4For

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

176.31.73.90:443

45.76.159.214:8080

138.197.147.101:443

104.168.154.79:8080

149.56.131.28:8080

5.9.116.246:8080

77.81.247.144:8080

172.104.251.154:8080

50.30.40.196:8080

173.212.193.249:8080

51.91.76.89:8080

197.242.150.244:8080

103.75.201.2:443

51.254.140.238:7080

79.137.35.198:8080

72.15.201.15:8080

27.54.89.58:8080

189.126.111.200:7080

196.218.30.83:443

82.165.152.127:8080

eck1.plain
ecs1.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\d78748f895c6348e88e7b2f28d3fe377057ad90417dde71b5ad254a829636338N.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1376

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1376-0-0x0000000002720000-0x0000000002721000-memory.dmp

    Filesize

    4KB

  • memory/1376-1-0x0000000180000000-0x000000018002B000-memory.dmp

    Filesize

    172KB

  • memory/1376-5-0x0000000180000000-0x000000018002B000-memory.dmp

    Filesize

    172KB

  • memory/1376-6-0x000000006AB00000-0x000000006AB7F000-memory.dmp

    Filesize

    508KB