a1516fa047960c65e70583f70e6bbdf6982c6742cb053955a70ee316f0c77558
General
Target
Filesize
Completed
a1516fa047960c65e70583f70e6bbdf6982c6742cb053955a70ee316f0c77558.dll
532KB
14-05-2022 15:02
Score
10/10
MD5
SHA1
SHA256
875fd3ee317183c4307799187ad66df5
ea9df854a90518e2fafedd26f142d2b9b4fc19af
a1516fa047960c65e70583f70e6bbdf6982c6742cb053955a70ee316f0c77558
Malware Config
Signatures 5
Filter: none
-
Emotet
Description
Emotet is a trojan that is primarily spread through spam emails.
Tags
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Description
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Tags
-
Suspicious behavior: EnumeratesProcessesregsvr32.exe
Reported IOCs
pid process 2676 regsvr32.exe 2676 regsvr32.exe -
Suspicious behavior: RenamesItselfregsvr32.exe
Reported IOCs
pid process 2344 regsvr32.exe -
Suspicious use of WriteProcessMemoryregsvr32.exe
Reported IOCs
description pid process target process PID 2344 wrote to memory of 2676 2344 regsvr32.exe regsvr32.exe PID 2344 wrote to memory of 2676 2344 regsvr32.exe regsvr32.exe
Processes 2
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a1516fa047960c65e70583f70e6bbdf6982c6742cb053955a70ee316f0c77558.dllSuspicious behavior: RenamesItselfSuspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\ESKFdSDPaazTeuy\UGXtbJ.dll"Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
memory/2344-118-0x0000000180000000-0x0000000180030000-memory.dmp
-
memory/2676-123-0x0000000000000000-mapping.dmp
Title
Loading data