Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-10-2022 19:09
Static task
static1
Behavioral task
behavioral1
Sample
14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll
Resource
win10v2004-20220812-en
General
-
Target
14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll
-
Size
782KB
-
MD5
b348a8ea634ee62341dd4d550a59ac2a
-
SHA1
ae2b651868055c8ce8efed055c152d60601276c1
-
SHA256
14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8
-
SHA512
bc7ddc29182f747fff6f6553a40a4344f51139e8c93d7d0432abdc7d4502a47ea7614c830a5fd0c9ba9b7fe020db3337009fe1ea319d8bfdc917bd1fedc151e1
-
SSDEEP
12288:MJKq8anpHpFmpoq3vjbL6c1jO4lOXLDw/jv4JCxJj2:AJ8ljCxDwLv4E
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1756 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1756 AUDIODG.EXE Token: 33 1756 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1756 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1580 1672 regsvr32.exe 27 PID 1672 wrote to memory of 1580 1672 regsvr32.exe 27 PID 1672 wrote to memory of 1580 1672 regsvr32.exe 27 PID 1672 wrote to memory of 1580 1672 regsvr32.exe 27 PID 1672 wrote to memory of 1580 1672 regsvr32.exe 27 PID 1672 wrote to memory of 1580 1672 regsvr32.exe 27 PID 1672 wrote to memory of 1580 1672 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\14da004cc96b910fb75abb86df09e318d92f4fb8dda39c8bd6a8e0601b6605d8.dll2⤵PID:1580
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1192
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x56c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1756