Analysis

  • max time kernel
    131s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 06:28

General

  • Target

    $SYSDIR/stwebdll.dll

  • Size

    104KB

  • MD5

    92119ff7a175e5635b87726306d82635

  • SHA1

    6125103765180006ff3923ab03bf32d33dd491cc

  • SHA256

    89cf6ae4df753095e06b2237e1127c8d0cc6cb879d877287355de47b59d08f28

  • SHA512

    2130595f4a2be6ede12ff65084cbb90ffcb898fb5eb379cffaee5a4967305b6aa3c2b04e1a954b9d84000eee4d76447ceaf6031d3d0b0b09d7adf8330a750622

  • SSDEEP

    1536:weCN8rpRhbxfocQBfH/0B0sxOtTvAWsTNjF1A+OWDlSuHnZQsoQnz8NZWYK+2GA:b1RhKcQBffc0sQAxjFSYlRH6sokz8HbK

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 41 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$SYSDIR\stwebdll.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$SYSDIR\stwebdll.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:4480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads