Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 13:23
Static task
static1
General
-
Target
1738d59a57196ad279b6b488fccb7419f6fa9794369281d3ec52282b175beda9.dll
-
Size
538KB
-
MD5
a1fa549a727c5c0c3e9808e2d0106604
-
SHA1
7f8b42ad4d73352435f5af232e57595cec08193f
-
SHA256
1738d59a57196ad279b6b488fccb7419f6fa9794369281d3ec52282b175beda9
-
SHA512
2d35525ceec93446ae5178ed7ca146eb66fb44986458d529c8103216dca64d310d8ad76f2dc11354227bfd254372d22b34e83b9d4e8ee05be5d7924d1c5b738b
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2660 regsvr32.exe 2660 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 3096 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3096 wrote to memory of 2660 3096 regsvr32.exe regsvr32.exe PID 3096 wrote to memory of 2660 3096 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1738d59a57196ad279b6b488fccb7419f6fa9794369281d3ec52282b175beda9.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\HDzQsHdZITJTc\hBdI.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-