Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
ca14bd639cf277c2d121c0d78526259a5ebe18e89c80d4471d6430720f6b72c6.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca14bd639cf277c2d121c0d78526259a5ebe18e89c80d4471d6430720f6b72c6.dll
Resource
win10v2004-20240802-en
General
-
Target
ca14bd639cf277c2d121c0d78526259a5ebe18e89c80d4471d6430720f6b72c6.dll
-
Size
76KB
-
MD5
5e7b21c1814af4f78cfb1bc9adf30c62
-
SHA1
e3c27bd8ee65a0cab8bd80d27edb046a5302a47d
-
SHA256
ca14bd639cf277c2d121c0d78526259a5ebe18e89c80d4471d6430720f6b72c6
-
SHA512
12d61e788b377dc587dc55f9c822f05d901df58304bbb88e6ad5cb6a447186891d1195b3ece43b2021f4e37ec869c8ae202e1ac38538ee482a40ee5429278c3d
-
SSDEEP
768:IAWM598jYwv2VH+dKY0U5gmP8Q8/obt2r2JHl+Qss:Z56lv2VH+dKY0UIYF+Ts
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3268 1616 regsvr32.exe 83 PID 1616 wrote to memory of 3268 1616 regsvr32.exe 83 PID 1616 wrote to memory of 3268 1616 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ca14bd639cf277c2d121c0d78526259a5ebe18e89c80d4471d6430720f6b72c6.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ca14bd639cf277c2d121c0d78526259a5ebe18e89c80d4471d6430720f6b72c6.dll2⤵
- System Location Discovery: System Language Discovery
PID:3268
-