Analysis
-
max time kernel
15s -
max time network
67s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-11-2020 21:23
Static task
static1
Behavioral task
behavioral1
Sample
b.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b.dll
Resource
win10v20201028
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
spr3.bat
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
spr3.bat
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
spr3.bat
-
Size
120B
-
MD5
0a37d2a3cabd448a356ebdc17db26faa
-
SHA1
3df10248594f751c1e541842f35148cb5680302d
-
SHA256
4dc80ea19819e537510fdedff44c7f33be5f57cd651b04358161407e214f72e8
-
SHA512
a57ebda35176c34809f0ac6fa866256ea551828da0e6a31eafce5438880610164d5f92dfc52f4592d640f2ec566fe1aec319cdcafe48cee9a82936028cf608de
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 884 wrote to memory of 3932 884 cmd.exe 74 PID 884 wrote to memory of 3932 884 cmd.exe 74 PID 3932 wrote to memory of 3888 3932 rundll32.exe 76 PID 3932 wrote to memory of 3888 3932 rundll32.exe 76 PID 3932 wrote to memory of 3888 3932 rundll32.exe 76
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\spr3.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\b.dll",DllRegisterServer --Password10Char --append="antani" --multiproc2⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\b.dll",DllRegisterServer --Password10Char --append="antani" --multiproc3⤵PID:3888
-
-