Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 11:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.dll
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
file.dll
-
Size
1.6MB
-
MD5
fae983329315cd7483dc94f0c8e48f42
-
SHA1
3341662884ee54dc51c461aa68bcc8f1c50964b5
-
SHA256
fa2ed3a1bb56b650735e666204668b4930378d67f3073583ae3dfc7628d82139
-
SHA512
57b893a305181cde704b5baa7b50595c96e973726294d7e665a5c689eb83194e5ae54927350896a5ec75d5135f9dc74532f3f03342c200be247224b19206f0e6
-
SSDEEP
24576:moeIbnLB0ZvvEHFy6r17/WJ7f05mMkj/E/OHdKjtIgTf5gOSXQF+Tt9g7wo1Ysi:mRZ046rtpmMo1HdKjT7SgF+fg7wo1j
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2172 2440 regsvr32.exe 29 PID 2440 wrote to memory of 2172 2440 regsvr32.exe 29 PID 2440 wrote to memory of 2172 2440 regsvr32.exe 29 PID 2440 wrote to memory of 2172 2440 regsvr32.exe 29 PID 2440 wrote to memory of 2172 2440 regsvr32.exe 29 PID 2440 wrote to memory of 2172 2440 regsvr32.exe 29 PID 2440 wrote to memory of 2172 2440 regsvr32.exe 29