Analysis

  • max time kernel
    82s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 23:55

General

  • Target

    $WINDIR/System32/dsaoms.dll

  • Size

    92KB

  • MD5

    a27e788246ebb3fb59173594d314fd33

  • SHA1

    8081d0f8cb50ebec461427d132c1d6af0c1a734b

  • SHA256

    c89a745ab8482e9871d1f86d0c73d30e651189769614c80a972b5e76aba28165

  • SHA512

    3ae147466c0d15887db70f2f8aed92126e7c0e670444ec76d24f50c4beb67c6745edd87778a70581d9cc5b6ea7a0bfc6a4c20a8aa5ffe590a64eb40f3bd7bba2

  • SSDEEP

    1536:fFp5UswnyM1VVvkXO9fWftSpfaaXVagKQwbMBwiAo3NN+8wlUsV/T0:z5UswnyM3VvlSsVa3X23T+8wlUs1A

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 50 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$WINDIR\System32\dsaoms.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$WINDIR\System32\dsaoms.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads