Overview
overview
10Static
static
3407749c986...2N.exe
windows7-x64
7407749c986...2N.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$TEMP/windll.dll
windows7-x64
10$TEMP/windll.dll
windows10-2004-x64
10$TEMP/word....0.exe
windows7-x64
7$TEMP/word....0.exe
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
407749c9862fa3fd6219065cb7ccd4f135a06dbcb7d69342b9badda9273fa292N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
407749c9862fa3fd6219065cb7ccd4f135a06dbcb7d69342b9badda9273fa292N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/windll.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/windll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/word-repair-software-3.0.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$TEMP/word-repair-software-3.0.exe
Resource
win10v2004-20240910-en
General
-
Target
$TEMP/windll.dll
-
Size
128KB
-
MD5
3752b12d253975e2e57d1019f0694c1b
-
SHA1
21540d83c8a5a411a2a8136945a742db396a5196
-
SHA256
7f0b77ee743f5ff9c3dc55c3215f2151fe57a3fdec710f8473fbe4c95120d2b9
-
SHA512
a85a9d7cda719cdd50409ddf7729f40193d87f0b853372989fd0a9803c0af3d3e441a7022a1dae4b35047ed35714ca295c17239b5acb3266b8f6d8f2957e5d50
-
SSDEEP
3072:ZY3Mxe4bs9QeFfo/ZLnuRfooq5lH+XbeQmjkUUZEDPUIQrYS0NY:ZY3Mxe4bPeJoBLnagoqLkeQNpeDPeR0q
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\MSOutlook = "{a1d295c9-a3ff-4974-b181-15fcf6638bc3}" regsvr32.exe -
Loads dropped DLL 1 IoCs
pid Process 2188 regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\MS\MSOutlook.dll regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a1d295c9-a3ff-4974-b181-15fcf6638bc3}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a1d295c9-a3ff-4974-b181-15fcf6638bc3}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\MS\\MSOutlook.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a1d295c9-a3ff-4974-b181-15fcf6638bc3}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a1d295c9-a3ff-4974-b181-15fcf6638bc3} regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2188 regsvr32.exe 2188 regsvr32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2188 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2188 3020 regsvr32.exe 30 PID 3020 wrote to memory of 2188 3020 regsvr32.exe 30 PID 3020 wrote to memory of 2188 3020 regsvr32.exe 30 PID 3020 wrote to memory of 2188 3020 regsvr32.exe 30 PID 3020 wrote to memory of 2188 3020 regsvr32.exe 30 PID 3020 wrote to memory of 2188 3020 regsvr32.exe 30 PID 3020 wrote to memory of 2188 3020 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\$TEMP\windll.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\$TEMP\windll.dll2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD53752b12d253975e2e57d1019f0694c1b
SHA121540d83c8a5a411a2a8136945a742db396a5196
SHA2567f0b77ee743f5ff9c3dc55c3215f2151fe57a3fdec710f8473fbe4c95120d2b9
SHA512a85a9d7cda719cdd50409ddf7729f40193d87f0b853372989fd0a9803c0af3d3e441a7022a1dae4b35047ed35714ca295c17239b5acb3266b8f6d8f2957e5d50