Analysis
-
max time kernel
74s -
max time network
142s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 14:11
Static task
static1
General
-
Target
40c9ea4aa45bdee20a39a35b6d6709dbcbf8ae44e57a1cbdf23946d76e8e1dc4.dll
-
Size
532KB
-
MD5
5765298479aeec1880f2d5b8f17af7f5
-
SHA1
4a0cce9c16935a41924aebbcd5d7ca8936ca75ae
-
SHA256
40c9ea4aa45bdee20a39a35b6d6709dbcbf8ae44e57a1cbdf23946d76e8e1dc4
-
SHA512
dda5d1e122995ce4558a37b1af37bc7497f0a08e42f28f0fb690581ec3356dbc42dc975b6f20d8e2d43e92009f70d4b0b974d03538d4fc9c60c0f530c36a60e1
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1392 regsvr32.exe 1392 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 1940 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1940 wrote to memory of 1392 1940 regsvr32.exe regsvr32.exe PID 1940 wrote to memory of 1392 1940 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\40c9ea4aa45bdee20a39a35b6d6709dbcbf8ae44e57a1cbdf23946d76e8e1dc4.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\MRIvmXfKBoEeLRfE\ifkbtCJ.dll"2⤵
- Suspicious behavior: EnumeratesProcesses