Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
13-05-2022 10:07
Static task
static1
General
-
Target
2d01f6f379d029362d1257d7186015d73af0f984d3e08634af25681217919dc7.dll
-
Size
532KB
-
MD5
a3148a27064f5c1d41e2ac03e1d7dc5f
-
SHA1
82349f44db3ab94a898f6429a8ea73be18e72ecb
-
SHA256
2d01f6f379d029362d1257d7186015d73af0f984d3e08634af25681217919dc7
-
SHA512
e2174a15d20e7edff7a99f3b4050cff50a09acd8a4e833baf5be7daf2aeae60aae83973703309f283c8c6ecbbaa0aa848c35edec5aecb1fc749678e657b3988b
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2580 regsvr32.exe 2580 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2308 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2580 2308 regsvr32.exe 67 PID 2308 wrote to memory of 2580 2308 regsvr32.exe 67
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2d01f6f379d029362d1257d7186015d73af0f984d3e08634af25681217919dc7.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\JRUDraydlw\nLkqSCWcpWzTM.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-