Analysis
-
max time kernel
3s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-12-2020 18:28
Static task
static1
Behavioral task
behavioral1
Sample
b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.dll
-
Size
788KB
-
MD5
e5c83994fb7a6ab58291ac93755d93a6
-
SHA1
e393e791368c34cf4aecc87760f3eee90d946946
-
SHA256
b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6
-
SHA512
7b9c7af34c1adb502ab3845bf0a32cd3f6838b7afac2a4c85c588a889caa8f2e4e79c77ee2c1ef35baf83fa8adb9fbb1953cd432444e7fed47d1ed44b170d411
Score
10/10
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2016 1204 regsvr32.exe 26 PID 1204 wrote to memory of 2016 1204 regsvr32.exe 26 PID 1204 wrote to memory of 2016 1204 regsvr32.exe 26 PID 1204 wrote to memory of 2016 1204 regsvr32.exe 26 PID 1204 wrote to memory of 2016 1204 regsvr32.exe 26 PID 1204 wrote to memory of 2016 1204 regsvr32.exe 26 PID 1204 wrote to memory of 2016 1204 regsvr32.exe 26
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.dll2⤵PID:2016
-