Analysis
-
max time kernel
3s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-11-2020 21:23
Static task
static1
Behavioral task
behavioral1
Sample
b.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b.dll
Resource
win10v20201028
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
spr3.bat
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
spr3.bat
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
spr3.bat
-
Size
120B
-
MD5
0a37d2a3cabd448a356ebdc17db26faa
-
SHA1
3df10248594f751c1e541842f35148cb5680302d
-
SHA256
4dc80ea19819e537510fdedff44c7f33be5f57cd651b04358161407e214f72e8
-
SHA512
a57ebda35176c34809f0ac6fa866256ea551828da0e6a31eafce5438880610164d5f92dfc52f4592d640f2ec566fe1aec319cdcafe48cee9a82936028cf608de
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 764 wrote to memory of 1172 764 cmd.exe 27 PID 764 wrote to memory of 1172 764 cmd.exe 27 PID 764 wrote to memory of 1172 764 cmd.exe 27 PID 1172 wrote to memory of 2024 1172 rundll32.exe 28 PID 1172 wrote to memory of 2024 1172 rundll32.exe 28 PID 1172 wrote to memory of 2024 1172 rundll32.exe 28 PID 1172 wrote to memory of 2024 1172 rundll32.exe 28 PID 1172 wrote to memory of 2024 1172 rundll32.exe 28 PID 1172 wrote to memory of 2024 1172 rundll32.exe 28 PID 1172 wrote to memory of 2024 1172 rundll32.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\spr3.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\b.dll",DllRegisterServer --Password10Char --append="antani" --multiproc2⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\b.dll",DllRegisterServer --Password10Char --append="antani" --multiproc3⤵PID:2024
-
-