Analysis
-
max time kernel
97s -
max time network
133s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 14:38
Static task
static1
General
-
Target
c614c2eae16f945d9aadad385229eee81205ebb52039bedc828605a1fd5f9c69.dll
-
Size
532KB
-
MD5
b4a8c040bb4ae88b8b91bb013f6e233f
-
SHA1
c7f5e61af47fa84273a1ca52f21e17eee96c9423
-
SHA256
c614c2eae16f945d9aadad385229eee81205ebb52039bedc828605a1fd5f9c69
-
SHA512
85c226c89ac380ed34f83d2392f4bd7c639489ba79153cba99d2a8267d715889799dd8682f16ed2a1ebb22ac27c7eb3e9d8dd14bdd3566ba672d949650637142
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1460 regsvr32.exe 1460 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 912 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 912 wrote to memory of 1460 912 regsvr32.exe regsvr32.exe PID 912 wrote to memory of 1460 912 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c614c2eae16f945d9aadad385229eee81205ebb52039bedc828605a1fd5f9c69.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\BMTtdCq\ecCrwZtn.dll"2⤵
- Suspicious behavior: EnumeratesProcesses