Analysis
-
max time kernel
71s -
max time network
138s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 14:28
Static task
static1
General
-
Target
841186045c59be1a6345bdf27b3cd44a87d854b319aec7fe74a05cdb564160b2.dll
-
Size
532KB
-
MD5
a8a83fb2ff09794504d12cd1139959d4
-
SHA1
77318c33c2d912c70cbf1dbe65bb8425e6248018
-
SHA256
841186045c59be1a6345bdf27b3cd44a87d854b319aec7fe74a05cdb564160b2
-
SHA512
025f525bd806de722eab3f0655bd5e9e73f5ebad0dc51a05e763640349c439dd43633f1fab8df859f325cfde4d7901c9fe884727fb1fba514ea9f1631839c5ad
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2784 regsvr32.exe 2784 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 2328 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2328 wrote to memory of 2784 2328 regsvr32.exe regsvr32.exe PID 2328 wrote to memory of 2784 2328 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\841186045c59be1a6345bdf27b3cd44a87d854b319aec7fe74a05cdb564160b2.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\AxWEtvVM\BcwCYPhkwhtYb.dll"2⤵
- Suspicious behavior: EnumeratesProcesses