Analysis
-
max time kernel
12s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-11-2020 21:59
Static task
static1
Behavioral task
behavioral1
Sample
b.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b.dll
Resource
win10v20201028
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
spr3.bat
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
spr3.bat
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
spr3.bat
-
Size
118B
-
MD5
57f297831820cb5713d32f0d6d9580b9
-
SHA1
57d2a1ecae9c1bdb05b2959efe65ca41487139c9
-
SHA256
7492ef9872b4555c6b91d39b2ebcad2d54aac2a6876d1c8e8d948500dd0c9f78
-
SHA512
20e8d299ec917c9281112b381944ae9b2ec717710390cbe0075a5cd999c8fdd01a75463c542dd1c504144cff0d6ab4591cfc5a304c4821ab2064527c732b09fd
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 428 wrote to memory of 2788 428 cmd.exe 74 PID 428 wrote to memory of 2788 428 cmd.exe 74 PID 2788 wrote to memory of 3228 2788 rundll32.exe 76 PID 2788 wrote to memory of 3228 2788 rundll32.exe 76 PID 2788 wrote to memory of 3228 2788 rundll32.exe 76
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\spr3.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\b.dll",DllRegisterServer --passegregor9 --append="antani" --multiproc2⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\b.dll",DllRegisterServer --passegregor9 --append="antani" --multiproc3⤵PID:3228
-
-