Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 13:20
Static task
static1
General
-
Target
4c121b1cea79a879d52ff3869efdaedd7af24fc54111020ee2bc55360c06a5e8.dll
-
Size
538KB
-
MD5
01c7bc3ec2352c776c025003153268c4
-
SHA1
93b8ab6a314a5c7ade63a7844488d630592882a9
-
SHA256
4c121b1cea79a879d52ff3869efdaedd7af24fc54111020ee2bc55360c06a5e8
-
SHA512
e79ac9fa7a8f324b7366fb9fc8a52cb26f701600adddec7e25e5cc4a5ba9d4944e614e80a0ed5b9943ec923b745569cba0ae3256278a88b93c1981dcd45350bc
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1172 regsvr32.exe 1172 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 1344 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1344 wrote to memory of 1172 1344 regsvr32.exe regsvr32.exe PID 1344 wrote to memory of 1172 1344 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4c121b1cea79a879d52ff3869efdaedd7af24fc54111020ee2bc55360c06a5e8.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\VnOierHvAjV\kDruAMIdVPTi.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-