Analysis
-
max time kernel
68s -
max time network
135s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 13:40
Static task
static1
General
-
Target
73a6317b93bc75e151a95d3417fa113ea93621a1c406613dab5c801393d448d0.dll
-
Size
532KB
-
MD5
3b1105e5f9840a1f7065884c708ad570
-
SHA1
d0aa252f712037652f0f00647309d72472547670
-
SHA256
73a6317b93bc75e151a95d3417fa113ea93621a1c406613dab5c801393d448d0
-
SHA512
0363fb431a1848fb80c0658dd0bb1ea07ee164e992e87e2ed47d2a313509e1c8354566dfab2903e6c5a7eeef8e2a9c864c0cce0b8028cd8e7bf5fa367ca34e0d
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 4716 regsvr32.exe 4716 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 4692 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4692 wrote to memory of 4716 4692 regsvr32.exe regsvr32.exe PID 4692 wrote to memory of 4716 4692 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\73a6317b93bc75e151a95d3417fa113ea93621a1c406613dab5c801393d448d0.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\SCYroYoNvG\GWsNOEFn.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-