Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 18:34
Static task
static1
Behavioral task
behavioral1
Sample
d858b09443e72bbb7984580c9113c3e0N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d858b09443e72bbb7984580c9113c3e0N.dll
Resource
win10v2004-20240802-en
General
-
Target
d858b09443e72bbb7984580c9113c3e0N.dll
-
Size
371KB
-
MD5
d858b09443e72bbb7984580c9113c3e0
-
SHA1
5432fccd26266bae8da41530dfdee804048c1d38
-
SHA256
708b3e292f72a1013869b0b6c7d2608e87a49891fc07a91fd9030cadf9a734d3
-
SHA512
3ea4487e5776f3c6c61b41431d3a0b4b31ca1761cb1b079b8026a6ad8ca8372900edeb33e199f970e8100c92dcb4ca5d045965e76152af0d2d4460fa13fcc644
-
SSDEEP
6144:Ovj5gNvghBCF6pICDBtdaYYE3XPYN/yHihpcSEP:ugFghBCFKDbdaxEPw/QV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 760 wrote to memory of 1840 760 regsvr32.exe 82 PID 760 wrote to memory of 1840 760 regsvr32.exe 82 PID 760 wrote to memory of 1840 760 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d858b09443e72bbb7984580c9113c3e0N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d858b09443e72bbb7984580c9113c3e0N.dll2⤵
- System Location Discovery: System Language Discovery
PID:1840
-