Analysis
-
max time kernel
3s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
30-10-2020 03:10
Static task
static1
Behavioral task
behavioral1
Sample
aee131ba1bfc4b6fa1961a7336e43d667086ebd2c7ff81029e14b2bf47d9f3a7.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
aee131ba1bfc4b6fa1961a7336e43d667086ebd2c7ff81029e14b2bf47d9f3a7.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
aee131ba1bfc4b6fa1961a7336e43d667086ebd2c7ff81029e14b2bf47d9f3a7.dll
-
Size
788KB
-
MD5
4c36c3533a283e1aa199f80e20d264b9
-
SHA1
f73e31d11f462f522a883c8f8f06d44f8d3e2f01
-
SHA256
aee131ba1bfc4b6fa1961a7336e43d667086ebd2c7ff81029e14b2bf47d9f3a7
-
SHA512
b2bae09cf2cce6c51b927aec9d9e3d66105337fbc81460350c5b2d255414f14e41c698f8ab4f06d2b98da684d854008bab78bf7a54cdf988969736ebb1272e50
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 288 wrote to memory of 1512 288 regsvr32.exe 26 PID 288 wrote to memory of 1512 288 regsvr32.exe 26 PID 288 wrote to memory of 1512 288 regsvr32.exe 26 PID 288 wrote to memory of 1512 288 regsvr32.exe 26 PID 288 wrote to memory of 1512 288 regsvr32.exe 26 PID 288 wrote to memory of 1512 288 regsvr32.exe 26 PID 288 wrote to memory of 1512 288 regsvr32.exe 26
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\aee131ba1bfc4b6fa1961a7336e43d667086ebd2c7ff81029e14b2bf47d9f3a7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\aee131ba1bfc4b6fa1961a7336e43d667086ebd2c7ff81029e14b2bf47d9f3a7.dll2⤵PID:1512
-