Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 19:43
Static task
static1
Behavioral task
behavioral1
Sample
ISmm7Q94U.dll
Resource
win7-20240903-en
General
-
Target
ISmm7Q94U.dll
-
Size
822KB
-
MD5
4a659a5e48556eb45b4f05ecede16671
-
SHA1
135d7bf7ca4d37887892a0c272ca549602cc5145
-
SHA256
15e9869fff87b5456e40358c52007c9e3f7dbfbe9096aea8c2712e65deb65a5b
-
SHA512
0e5c1e3055071de09031021688492133f9928462a5a5cc8d8793ee3b542e774399dbac6dd8c81eaf307ca8ce30260537d8eb7bceb824fab29a75d797ac131864
-
SSDEEP
6144:v7rc6Wk6SYnaKOai5uWLwrd0jSjc0vNPqBVzLFW5WUPV2m7hzS7583Tg7A+++ncE:vXcFk6SYna2Frd0jSjcc9SnmBZX0TMh
Malware Config
Extracted
emotet
Epoch4
149.56.131.28:8080
72.15.201.15:8080
207.148.79.14:8080
82.165.152.127:8080
46.55.222.11:443
213.241.20.155:443
163.44.196.120:8080
51.254.140.238:7080
107.170.39.149:8080
188.44.20.25:443
82.223.21.224:8080
172.104.251.154:8080
164.68.99.3:8080
101.50.0.91:8080
129.232.188.93:443
173.212.193.249:8080
103.132.242.26:8080
186.194.240.217:443
37.187.115.122:8080
91.207.28.33:8080
134.122.66.193:8080
1.234.2.232:8080
103.75.201.2:443
196.218.30.83:443
5.9.116.246:8080
103.70.28.102:8080
41.73.252.195:443
158.69.222.101:443
209.97.163.214:443
185.4.135.165:8080
115.68.227.76:8080
203.114.109.124:443
159.65.140.115:443
110.232.117.186:8080
51.91.76.89:8080
64.227.100.222:8080
150.95.66.124:8080
209.126.98.206:8080
153.126.146.25:7080
45.186.16.18:443
131.100.24.231:80
146.59.226.45:443
160.16.142.56:8080
167.172.253.162:8080
183.111.227.137:8080
119.193.124.41:7080
45.118.115.99:8080
159.89.202.34:443
51.161.73.194:443
212.24.98.99:8080
45.176.232.124:443
206.189.28.199:8080
197.242.150.244:8080
103.43.75.120:443
201.94.166.162:443
151.106.112.196:8080
157.245.196.132:443
159.65.88.10:8080
94.23.45.86:4143
79.137.35.198:8080
1.234.21.73:7080
45.235.8.30:8080
Signatures
-
Emotet family
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2420 regsvr32.exe 1324 regsvr32.exe 1324 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2420 regsvr32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1324 2420 regsvr32.exe 28 PID 2420 wrote to memory of 1324 2420 regsvr32.exe 28 PID 2420 wrote to memory of 1324 2420 regsvr32.exe 28 PID 2420 wrote to memory of 1324 2420 regsvr32.exe 28 PID 2420 wrote to memory of 1324 2420 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ISmm7Q94U.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\QxNzVJqkv\xWLyPTs.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1324
-