Analysis
-
max time kernel
30s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-11-2020 05:53
Static task
static1
Behavioral task
behavioral1
Sample
sdfsdf.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
sdfsdf.dll
-
Size
790KB
-
MD5
a654b3a37c27810db180822b72ad6d3e
-
SHA1
d2d9484276a208641517a2273d96f34de1394b8e
-
SHA256
4c9e3ffda0e663217638e6192a093bbc23cd9ebfbdf6d2fc683f331beaee0321
-
SHA512
181027d766c0c206b4a66273bdc4df5efad3f205533eb1f8af8b01bb6d320d59c15515cd19e56f20c72476e07c1529a5a9b280bdfb57e197c3dd071077d4d4ba
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 592 wrote to memory of 2040 592 regsvr32.exe 73 PID 592 wrote to memory of 2040 592 regsvr32.exe 73 PID 592 wrote to memory of 2040 592 regsvr32.exe 73