Analysis
-
max time kernel
52s -
max time network
139s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 14:55
Static task
static1
General
-
Target
88f0a1ebc6f8ef3a64016547f054dae52266d21e3b477af3defdf214ec33bbf3.dll
-
Size
532KB
-
MD5
b94deed373708d5bbffc079fee883cf0
-
SHA1
f016616d89f0f2a08b83ca7abfc23183e5a28cfa
-
SHA256
88f0a1ebc6f8ef3a64016547f054dae52266d21e3b477af3defdf214ec33bbf3
-
SHA512
73918abced05cea62d80314b901614c223439038533a4fbe271f21e7db5e1ffbc71c96d23532a6427f403a17fb32d4eb6b83c314fea627a62c3ba82caf3c528a
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1372 regsvr32.exe 1372 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 1184 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1184 wrote to memory of 1372 1184 regsvr32.exe regsvr32.exe PID 1184 wrote to memory of 1372 1184 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\88f0a1ebc6f8ef3a64016547f054dae52266d21e3b477af3defdf214ec33bbf3.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\KRKSExJxiwM\wTysHBspvpjoqSc.dll"2⤵
- Suspicious behavior: EnumeratesProcesses