Analysis
-
max time kernel
105s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
46d05720c624acde89e6d8a3441f4d80N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
46d05720c624acde89e6d8a3441f4d80N.dll
Resource
win10v2004-20240709-en
General
-
Target
46d05720c624acde89e6d8a3441f4d80N.dll
-
Size
1.4MB
-
MD5
46d05720c624acde89e6d8a3441f4d80
-
SHA1
807cec6ed3f9a5d231aae350daf1fe9d1786104e
-
SHA256
b75d5ff17f03b8cb3a26a66ecdb9a253ae05a2e9c36bf573880bdba7d6d7e94a
-
SHA512
884388b9ae8f5d999d7de30fac0ec9b5f4e67adecb9c6632bf2d3490d60df2b1415ad35031a11d2220ca997a0b8a539211e62bd153a121d88d42511b59e21696
-
SSDEEP
24576:zDIFsuFP4MgmgImi667nizFh11EQUqrBknG1Kn2AHzLVNX33va:z4Zy9zxz1EQLOG102qP3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2208 wrote to memory of 4052 2208 regsvr32.exe 84 PID 2208 wrote to memory of 4052 2208 regsvr32.exe 84 PID 2208 wrote to memory of 4052 2208 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\46d05720c624acde89e6d8a3441f4d80N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\46d05720c624acde89e6d8a3441f4d80N.dll2⤵
- System Location Discovery: System Language Discovery
PID:4052
-