Analysis
-
max time kernel
2s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-11-2020 21:30
Static task
static1
Behavioral task
behavioral1
Sample
b2.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b2.dll
Resource
win10v20201028
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
spr3.bat
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
spr3.bat
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
spr3.bat
-
Size
121B
-
MD5
0c126c56fc66b839998961859b7047c7
-
SHA1
f1079054aeb0d2c7b13f1bbf9d6bb2ec39d369a2
-
SHA256
0a92524512e6726c7a2839b9b8f0b904829f218054922ec64ea5c85918b13ddd
-
SHA512
c4acd93085ee0990a92a0af6ba37ddf6f7d73de4775d0fbfa98f1b0c1ee5fd6daa4729fe96d7283d20d9a8ab530a7caa3a4a936c5a7d3cba02109ee674e1182e
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1892 wrote to memory of 1344 1892 cmd.exe 27 PID 1892 wrote to memory of 1344 1892 cmd.exe 27 PID 1892 wrote to memory of 1344 1892 cmd.exe 27 PID 1344 wrote to memory of 1236 1344 rundll32.exe 28 PID 1344 wrote to memory of 1236 1344 rundll32.exe 28 PID 1344 wrote to memory of 1236 1344 rundll32.exe 28 PID 1344 wrote to memory of 1236 1344 rundll32.exe 28 PID 1344 wrote to memory of 1236 1344 rundll32.exe 28 PID 1344 wrote to memory of 1236 1344 rundll32.exe 28 PID 1344 wrote to memory of 1236 1344 rundll32.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\spr3.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\b2.dll",DllRegisterServer --Password10Char --append="antani" --multiproc2⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\b2.dll",DllRegisterServer --Password10Char --append="antani" --multiproc3⤵PID:1236
-
-