Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 20:36
Behavioral task
behavioral1
Sample
虚拟磁盘精灵/disk.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
虚拟磁盘精灵/disk.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
虚拟磁盘精灵/msvbvm60.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
虚拟磁盘精灵/msvbvm60.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
虚拟磁盘精灵/新云软件.url
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
虚拟磁盘精灵/新云软件.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
虚拟磁盘精灵/虚拟磁盘精灵.exe
Resource
win7-20240708-en
General
-
Target
虚拟磁盘精灵/msvbvm60.dll
-
Size
1.3MB
-
MD5
efcf843edd837c5ab013e53fe6d03993
-
SHA1
29b9d05786b2e27d7c7b08a5a7c6291da53bd4a7
-
SHA256
bec16f80e024ac2b182b46415872dbde1a1da553e850a2228a72dec4e05ed64b
-
SHA512
21fdad4e1a2663b376abccf30f7277d9df3f6cafc02eafc5f841fa3d8f66e943a218ade67a11a1631cd466639c391174d3359d59fa314e74ee9155e01229859b
-
SSDEEP
24576:1TGs6JlHZLKCd6oQwznJyXpWIqaqufQrRhLsbRmUSi8zlmZYnDg+:1TrojznJyXpWISufQrRhLBUSiWlFM+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\ = "VBPropertyBag" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\??????\\msvbvm60.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1140 wrote to memory of 452 1140 regsvr32.exe 84 PID 1140 wrote to memory of 452 1140 regsvr32.exe 84 PID 1140 wrote to memory of 452 1140 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\虚拟磁盘精灵\msvbvm60.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\虚拟磁盘精灵\msvbvm60.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:452
-