Analysis
-
max time kernel
14s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-07-2021 12:40
Static task
static1
Behavioral task
behavioral1
Sample
b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.sample.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.sample.dll
Resource
win10v20210410
General
-
Target
b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.sample.dll
-
Size
788KB
-
MD5
e5c83994fb7a6ab58291ac93755d93a6
-
SHA1
e393e791368c34cf4aecc87760f3eee90d946946
-
SHA256
b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6
-
SHA512
7b9c7af34c1adb502ab3845bf0a32cd3f6838b7afac2a4c85c588a889caa8f2e4e79c77ee2c1ef35baf83fa8adb9fbb1953cd432444e7fed47d1ed44b170d411
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 1012 3624 regsvr32.exe 74 PID 3624 wrote to memory of 1012 3624 regsvr32.exe 74 PID 3624 wrote to memory of 1012 3624 regsvr32.exe 74
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.sample.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6.sample.dll2⤵PID:1012
-