Analysis
-
max time kernel
180s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 18:03
Static task
static1
Behavioral task
behavioral1
Sample
14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll
Resource
win10v2004-20220812-en
General
-
Target
14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll
-
Size
782KB
-
MD5
b348a8ea634ee62341dd4d550a59ac2a
-
SHA1
ae2b651868055c8ce8efed055c152d60601276c1
-
SHA256
14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8
-
SHA512
bc7ddc29182f747fff6f6553a40a4344f51139e8c93d7d0432abdc7d4502a47ea7614c830a5fd0c9ba9b7fe020db3337009fe1ea319d8bfdc917bd1fedc151e1
-
SSDEEP
12288:MJKq8anpHpFmpoq3vjbL6c1jO4lOXLDw/jv4JCxJj2:AJ8ljCxDwLv4E
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4532 wrote to memory of 736 4532 regsvr32.exe 81 PID 4532 wrote to memory of 736 4532 regsvr32.exe 81 PID 4532 wrote to memory of 736 4532 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll2⤵PID:736
-