Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 10:04

General

  • Target

    94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37.dll

  • Size

    6.6MB

  • MD5

    91ead0a1293d0a89b7b68a577f60271a

  • SHA1

    0067540731ef0ad57f1054b9818eac126a997a29

  • SHA256

    94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37

  • SHA512

    744028cc472e052c3572a195f37b62d92f4e5d4810bcce893f288e2f1950f9354af6cf4f5157489ac8eaf349273f6f6b7f31981ad085db79953cb520dde3d44b

  • SSDEEP

    98304:kZaa3ZILbpZcvrVoZr8UNb6TUk+zZ/7tdJf5d0kacIzM:/apuZcSNbmUR1fpaZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\94e479ef08b0e546f4598efce8dfb237c3208ffa70a553b5519fd336a8f30f37.dll
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Windows\winaip.exe
        "C:\Windows\winaip.exe" -regaip
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\winaip.exe

          Filesize

          46KB

          MD5

          a344630ea27cc4ac558f3f50990f5eda

          SHA1

          39da423851d26ca9f177dc0dcff4e037e779476a

          SHA256

          b99b6dba4d1f6de19ab6792e9a3b7527e0a0c59137fade67a12406f92812f09e

          SHA512

          b423c14c8b2ec5c4a45a516abdc292a84d1501c2141db239d95c758312b835d6e31a658c73317550bc2827d3189ea5eace5916a9481af8a5aae7def92fb4352a