eaf81c04c71543d25ae1c82f2dda72faedfd5e20af1673ef743f5b066114c33b
General
Target
Filesize
Completed
eaf81c04c71543d25ae1c82f2dda72faedfd5e20af1673ef743f5b066114c33b.dll
532KB
14-05-2022 14:26
Score
10/10
MD5
SHA1
SHA256
9c049e96c9645bc20cbcac07d73ee424
367c9b716da2fd3146dc0a2783d401c21b676167
eaf81c04c71543d25ae1c82f2dda72faedfd5e20af1673ef743f5b066114c33b
Malware Config
Signatures 5
Filter: none
-
Emotet
Description
Emotet is a trojan that is primarily spread through spam emails.
Tags
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Description
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Tags
-
Suspicious behavior: EnumeratesProcessesregsvr32.exe
Reported IOCs
pid process 1096 regsvr32.exe 1096 regsvr32.exe -
Suspicious behavior: RenamesItselfregsvr32.exe
Reported IOCs
pid process 728 regsvr32.exe -
Suspicious use of WriteProcessMemoryregsvr32.exe
Reported IOCs
description pid process target process PID 728 wrote to memory of 1096 728 regsvr32.exe regsvr32.exe PID 728 wrote to memory of 1096 728 regsvr32.exe regsvr32.exe
Processes 2
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\eaf81c04c71543d25ae1c82f2dda72faedfd5e20af1673ef743f5b066114c33b.dllSuspicious behavior: RenamesItselfSuspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\FwXxkGN\LmIeYJpzS.dll"Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
memory/728-117-0x0000000180000000-0x0000000180030000-memory.dmp
-
memory/1096-122-0x0000000000000000-mapping.dmp
Title
Loading data