Analysis
-
max time kernel
53s -
max time network
144s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 13:30
Static task
static1
General
-
Target
c4b8221ea321f561c52a7d7f9874de099d00dc0ebd3b77766a959a0bb79d4189.dll
-
Size
532KB
-
MD5
c5d473d7e3eebfcdf92431eac28d8e26
-
SHA1
2857a67738e9a0277df6e5edf212776b9575f53b
-
SHA256
c4b8221ea321f561c52a7d7f9874de099d00dc0ebd3b77766a959a0bb79d4189
-
SHA512
4e03c8601ad4de679c2e2df6a3de767e6fab75f19bca65d2c8343c646d451583b48916882795b2e71197839e6c7c46a7af482e11deb1ff62a15c6e39fbeb3329
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1536 regsvr32.exe 1536 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 3692 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3692 wrote to memory of 1536 3692 regsvr32.exe regsvr32.exe PID 3692 wrote to memory of 1536 3692 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c4b8221ea321f561c52a7d7f9874de099d00dc0ebd3b77766a959a0bb79d4189.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\EJYSnxf\vdzPzM.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-