Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
4f65e8c05ae0d025e43e91b761730ed0df79cf6a222fbe0820d6024ef0d8ab52.dll
Resource
win7-20241023-en
General
-
Target
4f65e8c05ae0d025e43e91b761730ed0df79cf6a222fbe0820d6024ef0d8ab52.dll
-
Size
527KB
-
MD5
0fb47409c6a1b3ac661ce8f9e272016f
-
SHA1
6fec36092f78f0c489572810f21a939d72349bba
-
SHA256
4f65e8c05ae0d025e43e91b761730ed0df79cf6a222fbe0820d6024ef0d8ab52
-
SHA512
57dfc45b288278b8c98fcc8cf1bc55da6fcdb960a2d7e5c5a228db27d280b412ccca90c969100e4c508aed417bc4dbe7e773e268771e4c65b775a73f7b1849e2
-
SSDEEP
12288:smVdIG2GDNBtIlD987snfrkZW+mw3ffEPy:sm4GDNBtIl6wAZzmwvfEPy
Malware Config
Extracted
emotet
Epoch4
91.200.186.228:443
41.76.108.46:8080
188.165.214.166:7080
191.252.196.221:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Signatures
-
Emotet family
-
Blocklisted process makes network request 15 IoCs
flow pid Process 4 2092 rundll32.exe 7 2092 rundll32.exe 8 2092 rundll32.exe 9 2092 rundll32.exe 12 2092 rundll32.exe 13 2092 rundll32.exe 15 2092 rundll32.exe 16 2092 rundll32.exe 17 2092 rundll32.exe 18 2092 rundll32.exe 19 2092 rundll32.exe 22 2092 rundll32.exe 24 2092 rundll32.exe 25 2092 rundll32.exe 26 2092 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2092 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2124 1968 rundll32.exe 30 PID 1968 wrote to memory of 2124 1968 rundll32.exe 30 PID 1968 wrote to memory of 2124 1968 rundll32.exe 30 PID 1968 wrote to memory of 2124 1968 rundll32.exe 30 PID 1968 wrote to memory of 2124 1968 rundll32.exe 30 PID 1968 wrote to memory of 2124 1968 rundll32.exe 30 PID 1968 wrote to memory of 2124 1968 rundll32.exe 30 PID 2124 wrote to memory of 2092 2124 rundll32.exe 31 PID 2124 wrote to memory of 2092 2124 rundll32.exe 31 PID 2124 wrote to memory of 2092 2124 rundll32.exe 31 PID 2124 wrote to memory of 2092 2124 rundll32.exe 31 PID 2124 wrote to memory of 2092 2124 rundll32.exe 31 PID 2124 wrote to memory of 2092 2124 rundll32.exe 31 PID 2124 wrote to memory of 2092 2124 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f65e8c05ae0d025e43e91b761730ed0df79cf6a222fbe0820d6024ef0d8ab52.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f65e8c05ae0d025e43e91b761730ed0df79cf6a222fbe0820d6024ef0d8ab52.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\4f65e8c05ae0d025e43e91b761730ed0df79cf6a222fbe0820d6024ef0d8ab52.dll",Control_RunDLL3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-