Analysis
-
max time kernel
9s -
max time network
106s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-11-2020 20:44
Static task
static1
Behavioral task
behavioral1
Sample
sm.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sm.dll
Resource
win10v20201028
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
spr3.bat
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
spr3.bat
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
spr3.bat
-
Size
104B
-
MD5
be24d1c626ab197263bd959d649a5f3c
-
SHA1
531babc643f30cbf124b8b851bc00aaed02d56f3
-
SHA256
c6f6c3193603de650e709bae9f31c3749859ba88fd71b678be264e2bb46efa10
-
SHA512
66c094d2ae497bc46eee18eff05bd2faf087ec21e6bd731328301b1d91828b58f86ca523b8ac78ebd57ee111b2cbfb3848e0bad4fa5f0a77c398dfbe4f4509f7
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1160 wrote to memory of 2712 1160 cmd.exe 73 PID 1160 wrote to memory of 2712 1160 cmd.exe 73 PID 2712 wrote to memory of 2708 2712 rundll32.exe 74 PID 2712 wrote to memory of 2708 2712 rundll32.exe 74 PID 2712 wrote to memory of 2708 2712 rundll32.exe 74
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\spr3.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sm.dll",DllRegisterServer --append="antani" --multiproc2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sm.dll",DllRegisterServer --append="antani" --multiproc3⤵PID:2708
-
-