Overview
overview
10Static
static
100864575d4f...a0.dll
windows7-x64
30864575d4f...a0.dll
windows10-2004-x64
3933511776c...82.dll
windows7-x64
10933511776c...82.dll
windows10-2004-x64
1062bc8624b6...18.exe
windows7-x64
1062bc8624b6...18.exe
windows10-2004-x64
10bea9fc6693...3a.exe
windows7-x64
10bea9fc6693...3a.exe
windows10-2004-x64
10Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/02/2025, 09:30
Behavioral task
behavioral1
Sample
0864575d4f487e52a1479c61c2c4ad16742d92e16d0c10f5ed2b40506bbc6ca0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0864575d4f487e52a1479c61c2c4ad16742d92e16d0c10f5ed2b40506bbc6ca0.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
62bc8624b6ed645ddbe1420ca67376863c88e58e347fc8282001a2b9e3330918.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
62bc8624b6ed645ddbe1420ca67376863c88e58e347fc8282001a2b9e3330918.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
bea9fc669319cd16df759974397e79c05e7565e75ca7c052af346e08b5f1d13a.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
bea9fc669319cd16df759974397e79c05e7565e75ca7c052af346e08b5f1d13a.exe
Resource
win10v2004-20250217-en
General
-
Target
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll
-
Size
735KB
-
MD5
14e8fc68273e3cc5377ea8efd0230273
-
SHA1
49069bf64828b11730c36f112fde9131c3c86a63
-
SHA256
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82
-
SHA512
6cbf4d197b8fabfccbfb516acd4c11cb23934c3606e8ade1cfcf3845e2748405fb3b2d2012ad052607e4e959aea2bc75365ee9d8ca2bba7d1f4e1074ca35568a
-
SSDEEP
12288:agvTeqrCeX329Soy/O+TCJJU2QyDqXkkpodzR6TqKCKDeS:tviEdX3Y7GTCRhukkpbqUx
Malware Config
Extracted
emotet
Epoch4
131.100.24.231:80
209.59.138.75:7080
103.8.26.103:8080
51.38.71.0:443
212.237.17.99:8080
79.172.212.216:8080
207.38.84.195:8080
104.168.155.129:8080
178.79.147.66:8080
46.55.222.11:443
103.8.26.102:8080
192.254.71.210:443
45.176.232.124:443
203.114.109.124:443
51.68.175.8:8080
58.227.42.236:80
45.142.114.231:8080
217.182.143.207:443
178.63.25.185:443
45.118.115.99:8080
103.75.201.2:443
104.251.214.46:8080
158.69.222.101:443
81.0.236.90:443
45.118.135.203:7080
176.104.106.96:8080
212.237.56.116:7080
216.158.226.206:443
173.212.193.249:8080
50.116.54.215:443
138.185.72.26:8080
41.76.108.46:8080
212.237.5.209:443
107.182.225.142:8080
195.154.133.20:443
162.214.50.39:7080
110.232.117.186:8080
Signatures
-
Emotet family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2536 2408 regsvr32.exe 31 PID 2408 wrote to memory of 2536 2408 regsvr32.exe 31 PID 2408 wrote to memory of 2536 2408 regsvr32.exe 31 PID 2408 wrote to memory of 2536 2408 regsvr32.exe 31 PID 2408 wrote to memory of 2536 2408 regsvr32.exe 31 PID 2408 wrote to memory of 2536 2408 regsvr32.exe 31 PID 2408 wrote to memory of 2536 2408 regsvr32.exe 31 PID 2536 wrote to memory of 2116 2536 regsvr32.exe 32 PID 2536 wrote to memory of 2116 2536 regsvr32.exe 32 PID 2536 wrote to memory of 2116 2536 regsvr32.exe 32 PID 2536 wrote to memory of 2116 2536 regsvr32.exe 32 PID 2536 wrote to memory of 2116 2536 regsvr32.exe 32 PID 2536 wrote to memory of 2116 2536 regsvr32.exe 32 PID 2536 wrote to memory of 2116 2536 regsvr32.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll",DllRegisterServer3⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-