Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 13:20
Static task
static1
General
-
Target
70f5d7d12393a68280c216760e39267574c91e5f211b32be6b1977277a26bb9c.dll
-
Size
538KB
-
MD5
18b2109f5e3b4973b1b9d05d11f1e982
-
SHA1
43fb87858c89ef3e157aca63017c004f27dabce8
-
SHA256
70f5d7d12393a68280c216760e39267574c91e5f211b32be6b1977277a26bb9c
-
SHA512
ffab601f2118c202ea46398cc3d8015d70bf6c572daa9dcf44f2c9ad1ddc9502cf538da80587629eddd2a3824b7db940755f44922eb61271ab8fbdb5d94d10ce
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2044 regsvr32.exe 2044 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 1624 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1624 wrote to memory of 2044 1624 regsvr32.exe regsvr32.exe PID 1624 wrote to memory of 2044 1624 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\70f5d7d12393a68280c216760e39267574c91e5f211b32be6b1977277a26bb9c.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\QsiTzwrJKJTWguK\LtoCJ.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-