Analysis
-
max time kernel
55s -
max time network
142s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 14:12
Static task
static1
General
-
Target
1bb4c1a7c6dfa2c621c88cebc53ba9797098314d529ae5b57f5fb0a67dcd4067.dll
-
Size
532KB
-
MD5
ce77d5e051829511bea375c7668ecffc
-
SHA1
eb766ccc6045e90acf9aabe0f874ee78a90ffe97
-
SHA256
1bb4c1a7c6dfa2c621c88cebc53ba9797098314d529ae5b57f5fb0a67dcd4067
-
SHA512
c54e65dca0ecb87fbe6974c5115048014a6568fd513835a9172e4a651552bc95b9bbd957907ca85c0ba5ac2291b923841352c260ec61f9da77671bce7ef8f1a6
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 644 regsvr32.exe 644 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 1316 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1316 wrote to memory of 644 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 644 1316 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1bb4c1a7c6dfa2c621c88cebc53ba9797098314d529ae5b57f5fb0a67dcd4067.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\KjWHsNYMRC\LXICNDHW.dll"2⤵
- Suspicious behavior: EnumeratesProcesses