Analysis
-
max time kernel
12s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-11-2020 21:30
Static task
static1
Behavioral task
behavioral1
Sample
b2.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b2.dll
Resource
win10v20201028
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
spr3.bat
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
spr3.bat
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
b2.dll
-
Size
790KB
-
MD5
a654b3a37c27810db180822b72ad6d3e
-
SHA1
d2d9484276a208641517a2273d96f34de1394b8e
-
SHA256
4c9e3ffda0e663217638e6192a093bbc23cd9ebfbdf6d2fc683f331beaee0321
-
SHA512
181027d766c0c206b4a66273bdc4df5efad3f205533eb1f8af8b01bb6d320d59c15515cd19e56f20c72476e07c1529a5a9b280bdfb57e197c3dd071077d4d4ba
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1056 wrote to memory of 4000 1056 regsvr32.exe 71 PID 1056 wrote to memory of 4000 1056 regsvr32.exe 71 PID 1056 wrote to memory of 4000 1056 regsvr32.exe 71