Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 14:13

General

  • Target

    e3265600510b9a641994220c1ff957f0N.dll

  • Size

    2.0MB

  • MD5

    e3265600510b9a641994220c1ff957f0

  • SHA1

    159653c2b68b954a999a4fdb8abd91b152151cf4

  • SHA256

    3881f7ae4cd3f7db7e1904bc016d605133dd37b40e4d65cd13cb4a700f21dc7e

  • SHA512

    21e22bd73e4a0c71aa46b6defbd9879e0cfb0153979628044ea1e412eeb9f701261774ccbbf0b2a701d46924fcbc9299fd660806af264d3e3c40431ebe5030cb

  • SSDEEP

    49152:r3gbcdNzJ7TWBYo51e3NBoh5sUwyEcJcL0I2tMegYwc3st5a:0bGNz1WBYo0NBoh5sUwyEcJcL0I2tMpb

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e3265600510b9a641994220c1ff957f0N.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3288
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\e3265600510b9a641994220c1ff957f0N.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads