Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082.dll
Resource
win7-20241023-en
General
-
Target
19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082.dll
-
Size
1016KB
-
MD5
d4df1d527ab24d408f17a09191a46c4e
-
SHA1
8837dfecb6f32270a97eb6440a6c1864c908e1fd
-
SHA256
19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082
-
SHA512
45e7643ce2d7caaa8720b560812410a1e66727548de1542d8e223c4e8fe64413e7c54b6c38100ca0a8f951a35376acf76b4a7acdb19961fdafff40bb270f0be6
-
SSDEEP
12288:cR5SOyRHiA6m0OcElszt6JtcS1j2xKkr:cR5SOrKlszEtcK
Malware Config
Extracted
emotet
Epoch5
51.75.33.122:443
186.250.48.5:80
168.119.39.118:443
207.148.81.119:8080
194.9.172.107:8080
139.196.72.155:8080
78.47.204.80:443
159.69.237.188:443
45.71.195.104:8080
54.37.106.167:8080
185.168.130.138:443
37.44.244.177:8080
185.184.25.78:8080
185.148.168.15:8080
128.199.192.135:8080
37.59.209.141:8080
103.41.204.169:8080
185.148.168.220:8080
103.42.58.120:7080
78.46.73.125:443
68.183.93.250:443
190.90.233.66:443
5.56.132.177:8080
62.171.178.147:8080
196.44.98.190:8080
168.197.250.14:80
66.42.57.149:443
59.148.253.194:443
104.131.62.48:8080
191.252.103.16:80
54.37.228.122:443
88.217.172.165:8080
195.77.239.39:8080
116.124.128.206:8080
93.104.209.107:8080
118.98.72.86:443
217.182.143.207:443
87.106.97.83:7080
210.57.209.142:8080
54.38.242.185:443
195.154.146.35:443
203.153.216.46:443
198.199.98.78:8080
85.214.67.203:8080
Signatures
-
Emotet family
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Frxmwktaknqcacib\sjegrkhx.ukb regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1900 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2280 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2280 2272 regsvr32.exe 30 PID 2272 wrote to memory of 2280 2272 regsvr32.exe 30 PID 2272 wrote to memory of 2280 2272 regsvr32.exe 30 PID 2272 wrote to memory of 2280 2272 regsvr32.exe 30 PID 2272 wrote to memory of 2280 2272 regsvr32.exe 30 PID 2272 wrote to memory of 2280 2272 regsvr32.exe 30 PID 2272 wrote to memory of 2280 2272 regsvr32.exe 30 PID 2280 wrote to memory of 1900 2280 regsvr32.exe 31 PID 2280 wrote to memory of 1900 2280 regsvr32.exe 31 PID 2280 wrote to memory of 1900 2280 regsvr32.exe 31 PID 2280 wrote to memory of 1900 2280 regsvr32.exe 31 PID 2280 wrote to memory of 1900 2280 regsvr32.exe 31 PID 2280 wrote to memory of 1900 2280 regsvr32.exe 31 PID 2280 wrote to memory of 1900 2280 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082.dll2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Frxmwktaknqcacib\sjegrkhx.ukb"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-