Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
DSRegVC.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DSRegVC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
安装说明.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
安装说明.url
Resource
win10v2004-20240802-en
General
-
Target
DSRegVC.dll
-
Size
1.4MB
-
MD5
e9680e2271a9cbdb9765ca9f8c9baed8
-
SHA1
0aa3ebf584613f639fc6e1925e3c1da75ae9e747
-
SHA256
528d83a72f90872489649422e5505c05f416813d9f4e62c62ccbe3675fb471ef
-
SHA512
2ebe32836408afe8aa8674189813fe9638b1366f07945ba7c61bd93ef317267638e73a5742fc02c320cd1e0a37b19b1435e858fab209c9ff0cb58e93bcd6d8c7
-
SSDEEP
24576:pxCuoa2fIlzikiEv9ywoL778jSKvx/pt3Yv2rM331UR0UnHJVXI9g:p42EkiqO778jj1j14Hko
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{43CEDDB1-D81D-10F3-B9F8-35D1A9EE202B} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{43CEDDB1-D81D-10F3-B9F8-35D1A9EE202B}\ = "Picture Property Page" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{43CEDDB1-D81D-10F3-B9F8-35D1A9EE202B}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{43CEDDB1-D81D-10F3-B9F8-35D1A9EE202B}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mfc42u.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 892 wrote to memory of 4552 892 rundll32.exe 84 PID 892 wrote to memory of 4552 892 rundll32.exe 84 PID 892 wrote to memory of 4552 892 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DSRegVC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DSRegVC.dll,#12⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4552
-