Analysis
-
max time kernel
51s -
max time network
151s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
13-05-2022 08:00
Static task
static1
General
-
Target
f66b8a45a646c32cd674e2f129fb1bc8af118adb7afccd8c3a34970e89d0c3be.dll
-
Size
580KB
-
MD5
83b16a11e3616e29dab0d62f56db83cf
-
SHA1
88e6476a4717f1de0c76200827e69099e45d9186
-
SHA256
f66b8a45a646c32cd674e2f129fb1bc8af118adb7afccd8c3a34970e89d0c3be
-
SHA512
86ce09b0258cc10b284d2aba477f5830ec69535d14760a9bdb27f1c9435558a0fa97ef6c16dddec45c96619dab01882cc39da60ff33e3ea8bda15e618700a8bf
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3060 regsvr32.exe 3060 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3508 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3060 3508 regsvr32.exe 66 PID 3508 wrote to memory of 3060 3508 regsvr32.exe 66
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f66b8a45a646c32cd674e2f129fb1bc8af118adb7afccd8c3a34970e89d0c3be.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\FFcla\TxPuAnNvOKiPR.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-