Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
ab897675058ed0239d8e9f742cc12f2a69e09458efa8611a123808b13aee4315.dll
Resource
win7-20241010-en
General
-
Target
ab897675058ed0239d8e9f742cc12f2a69e09458efa8611a123808b13aee4315.dll
-
Size
680KB
-
MD5
47ee2f4695737f5ad82d86df862d339a
-
SHA1
652e6f6edc8f1eacdb03622e36125d8ddd82ad02
-
SHA256
ab897675058ed0239d8e9f742cc12f2a69e09458efa8611a123808b13aee4315
-
SHA512
e0b3113684a6a92f653caa83f87ffee81983c475a814f89d1723af54a9462e323944723ea804a11dc5d35a801174e578ecd5aedd1c8d80ec9e49f4248338423f
-
SSDEEP
12288:pWL+xbWhXWjdo9GeetVDn11EtAbrf5z/Kv7vvK5RUY+K4+mHWDn/nChiSw7dmDrP:pWL+xbqOdaGeetBEwf5zBCMV0rdAMuy
Malware Config
Extracted
emotet
Epoch4
216.120.236.62:8080
189.232.46.161:443
51.91.76.89:8080
217.182.25.250:8080
119.193.124.41:7080
159.8.59.82:8080
195.201.151.129:8080
58.227.42.236:80
212.24.98.99:8080
138.185.72.26:8080
131.100.24.231:80
192.99.251.50:443
158.69.222.101:443
197.242.150.244:8080
50.116.54.215:443
188.44.20.25:443
212.237.17.99:8080
153.126.146.25:7080
103.75.201.2:443
5.9.116.246:8080
185.8.212.130:7080
164.68.99.3:8080
45.118.135.203:7080
107.182.225.142:8080
151.106.112.196:8080
209.126.98.206:8080
79.172.212.216:8080
51.91.7.5:8080
72.15.201.15:8080
196.218.30.83:443
173.212.193.249:8080
82.165.152.127:8080
101.50.0.91:8080
103.43.46.182:443
216.158.226.206:443
167.172.253.162:8080
159.65.88.10:8080
50.30.40.196:8080
129.232.188.93:443
45.176.232.124:443
203.114.109.124:443
167.99.115.35:8080
195.154.133.20:443
51.254.140.238:7080
206.188.212.92:8080
31.24.158.56:8080
178.79.147.66:8080
45.118.115.99:8080
45.142.114.231:8080
185.157.82.211:8080
209.250.246.206:443
189.126.111.200:7080
1.234.21.73:7080
176.104.106.96:8080
201.94.166.162:443
110.232.117.186:8080
146.59.226.45:443
46.55.222.11:443
1.234.2.232:8080
134.122.66.193:8080
176.56.128.118:443
Signatures
-
Emotet family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1952 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1952 2332 regsvr32.exe 31 PID 2332 wrote to memory of 1952 2332 regsvr32.exe 31 PID 2332 wrote to memory of 1952 2332 regsvr32.exe 31 PID 2332 wrote to memory of 1952 2332 regsvr32.exe 31 PID 2332 wrote to memory of 1952 2332 regsvr32.exe 31 PID 2332 wrote to memory of 1952 2332 regsvr32.exe 31 PID 2332 wrote to memory of 1952 2332 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ab897675058ed0239d8e9f742cc12f2a69e09458efa8611a123808b13aee4315.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ab897675058ed0239d8e9f742cc12f2a69e09458efa8611a123808b13aee4315.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952
-