Analysis
-
max time kernel
54s -
max time network
140s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
14-05-2022 15:03
Static task
static1
General
-
Target
4a8692be9a1585c9eee64cadf16aed09c3b3e75cc6e0c4220935e9e57f54ba50.dll
-
Size
532KB
-
MD5
26dd23d9fd20a8514a42a84759678381
-
SHA1
01ebc0f7ea50110899fb5ead52ab6b8a8b64f2fb
-
SHA256
4a8692be9a1585c9eee64cadf16aed09c3b3e75cc6e0c4220935e9e57f54ba50
-
SHA512
f2a6fab1440606eda557ee27ac769e322588d470a058881862cffde455bcc84e5bbdb191aafceb4f8aaab7ee4fb94537519ae2db1752eb2e33306176a31ee58f
Malware Config
Signatures
-
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2676 regsvr32.exe 2676 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 2532 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2532 wrote to memory of 2676 2532 regsvr32.exe regsvr32.exe PID 2532 wrote to memory of 2676 2532 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4a8692be9a1585c9eee64cadf16aed09c3b3e75cc6e0c4220935e9e57f54ba50.dll1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\NTecphDOOVR\dQQBE.dll"2⤵
- Suspicious behavior: EnumeratesProcesses