Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082.dll
Resource
win7-20241023-en
General
-
Target
19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082.dll
-
Size
1016KB
-
MD5
d4df1d527ab24d408f17a09191a46c4e
-
SHA1
8837dfecb6f32270a97eb6440a6c1864c908e1fd
-
SHA256
19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082
-
SHA512
45e7643ce2d7caaa8720b560812410a1e66727548de1542d8e223c4e8fe64413e7c54b6c38100ca0a8f951a35376acf76b4a7acdb19961fdafff40bb270f0be6
-
SSDEEP
12288:cR5SOyRHiA6m0OcElszt6JtcS1j2xKkr:cR5SOrKlszEtcK
Malware Config
Extracted
emotet
Epoch5
51.75.33.122:443
186.250.48.5:80
168.119.39.118:443
207.148.81.119:8080
194.9.172.107:8080
139.196.72.155:8080
78.47.204.80:443
159.69.237.188:443
45.71.195.104:8080
54.37.106.167:8080
185.168.130.138:443
37.44.244.177:8080
185.184.25.78:8080
185.148.168.15:8080
128.199.192.135:8080
37.59.209.141:8080
103.41.204.169:8080
185.148.168.220:8080
103.42.58.120:7080
78.46.73.125:443
68.183.93.250:443
190.90.233.66:443
5.56.132.177:8080
62.171.178.147:8080
196.44.98.190:8080
168.197.250.14:80
66.42.57.149:443
59.148.253.194:443
104.131.62.48:8080
191.252.103.16:80
54.37.228.122:443
88.217.172.165:8080
195.77.239.39:8080
116.124.128.206:8080
93.104.209.107:8080
118.98.72.86:443
217.182.143.207:443
87.106.97.83:7080
210.57.209.142:8080
54.38.242.185:443
195.154.146.35:443
203.153.216.46:443
198.199.98.78:8080
85.214.67.203:8080
Signatures
-
Emotet family
-
Loads dropped DLL 1 IoCs
pid Process 3472 regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dgutfjyufc\infdbhfo.hdr regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3472 regsvr32.exe 3472 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1376 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4552 wrote to memory of 1376 4552 regsvr32.exe 83 PID 4552 wrote to memory of 1376 4552 regsvr32.exe 83 PID 4552 wrote to memory of 1376 4552 regsvr32.exe 83 PID 1376 wrote to memory of 3472 1376 regsvr32.exe 84 PID 1376 wrote to memory of 3472 1376 regsvr32.exe 84 PID 1376 wrote to memory of 3472 1376 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\19598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082.dll2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Dgutfjyufc\infdbhfo.hdr"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1016KB
MD5d4df1d527ab24d408f17a09191a46c4e
SHA18837dfecb6f32270a97eb6440a6c1864c908e1fd
SHA25619598931c717e428d0f388ed3750240104a19434957cafb46d0d83e8da367082
SHA51245e7643ce2d7caaa8720b560812410a1e66727548de1542d8e223c4e8fe64413e7c54b6c38100ca0a8f951a35376acf76b4a7acdb19961fdafff40bb270f0be6