Analysis
-
max time kernel
139s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 20:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e88a1858f15f91d658298c7c2d14d92a4c39e10fd2fb152d7ee149c1c4ddd17.dll
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
3e88a1858f15f91d658298c7c2d14d92a4c39e10fd2fb152d7ee149c1c4ddd17.dll
-
Size
5KB
-
MD5
47212cd83d29f8545854a621603b4d32
-
SHA1
21d459d93850465d842a26a23c7f5ffd1a9bf680
-
SHA256
3e88a1858f15f91d658298c7c2d14d92a4c39e10fd2fb152d7ee149c1c4ddd17
-
SHA512
4e15b9152ee27b4580d83377e3a7fafabdd8735160bd814ec664c27757d0d345fc0c0b9975e71b9f3472540358715b75f1283282d7e942c5d52b6c8ae4d300d2
-
SSDEEP
48:CuHc6a2f/h8h7w/oy9a4nANdgF/4tQIZW0H1lXnFFbh/o5Ww1b:5LanykMAN6/4iEWs/nN/sWw
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3384 wrote to memory of 212 3384 regsvr32.exe 86 PID 3384 wrote to memory of 212 3384 regsvr32.exe 86 PID 3384 wrote to memory of 212 3384 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3e88a1858f15f91d658298c7c2d14d92a4c39e10fd2fb152d7ee149c1c4ddd17.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3e88a1858f15f91d658298c7c2d14d92a4c39e10fd2fb152d7ee149c1c4ddd17.dll2⤵
- System Location Discovery: System Language Discovery
PID:212
-