Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
bdb88216c6768f4fe581ba811373f070N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdb88216c6768f4fe581ba811373f070N.dll
Resource
win10v2004-20240802-en
General
-
Target
bdb88216c6768f4fe581ba811373f070N.dll
-
Size
472KB
-
MD5
bdb88216c6768f4fe581ba811373f070
-
SHA1
6a58c2355d681697cd7cfeffbc8669cbc55e97e6
-
SHA256
5ef83c65b0c6113665df144319372ea00acac8ceadf1ea4aaf20c41155727167
-
SHA512
38fbeb45889bd807ced801b38e4f89e76b37f99283b7b16f8c49a601a5a94a1c18590922a77de077cbea0b4b335b77a0a33f9327040d328dea916fbcbc563bf2
-
SSDEEP
6144:wRdJiQ3y1Wczl1if96TY3Xuogp9lXkLQ9cMzF/xLLM9iiregmihpZv/zVJ2:krq5zlwf96Tm1etCs/W1reWvbVY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4100 wrote to memory of 1392 4100 regsvr32.exe 83 PID 4100 wrote to memory of 1392 4100 regsvr32.exe 83 PID 4100 wrote to memory of 1392 4100 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\bdb88216c6768f4fe581ba811373f070N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\bdb88216c6768f4fe581ba811373f070N.dll2⤵
- System Location Discovery: System Language Discovery
PID:1392
-