Analysis
-
max time kernel
3s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-11-2020 17:45
Static task
static1
Behavioral task
behavioral1
Sample
b.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
b.dll
-
Size
790KB
-
MD5
a654b3a37c27810db180822b72ad6d3e
-
SHA1
d2d9484276a208641517a2273d96f34de1394b8e
-
SHA256
4c9e3ffda0e663217638e6192a093bbc23cd9ebfbdf6d2fc683f331beaee0321
-
SHA512
181027d766c0c206b4a66273bdc4df5efad3f205533eb1f8af8b01bb6d320d59c15515cd19e56f20c72476e07c1529a5a9b280bdfb57e197c3dd071077d4d4ba
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 288 wrote to memory of 1972 288 regsvr32.exe 25 PID 288 wrote to memory of 1972 288 regsvr32.exe 25 PID 288 wrote to memory of 1972 288 regsvr32.exe 25 PID 288 wrote to memory of 1972 288 regsvr32.exe 25 PID 288 wrote to memory of 1972 288 regsvr32.exe 25 PID 288 wrote to memory of 1972 288 regsvr32.exe 25 PID 288 wrote to memory of 1972 288 regsvr32.exe 25