Analysis
-
max time kernel
62s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2022 19:10
Static task
static1
Behavioral task
behavioral1
Sample
ee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541.dll
Resource
win10v2004-20220812-en
General
-
Target
ee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541.dll
-
Size
784KB
-
MD5
427105821263afeeccca05b43ea8dac4
-
SHA1
fa33fd577f5eb4813bc69dce891361871cda860c
-
SHA256
ee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541
-
SHA512
d6806fbe2059e218cbaf90c6b61e3f0c2721d5b243fe7deb1d82340ace639b326145fee23d8778dec68a10f4f0321df9e2662d4ac8a79aec19c10357dbd81f7b
-
SSDEEP
12288:NQmAezlB4hf7yhY96Zh4Wjb16nFztKxHBzS4+fUs3xHxi:TB4iYp2dB+f7R
Malware Config
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3008 wrote to memory of 984 3008 regsvr32.exe 82 PID 3008 wrote to memory of 984 3008 regsvr32.exe 82 PID 3008 wrote to memory of 984 3008 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541.dll2⤵PID:984
-