Analysis
-
max time kernel
177s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
1- MARY ORGANIZER 2023 COMPLETE PDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1- MARY ORGANIZER 2023 COMPLETE PDF.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
msimg32.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
msimg32.dll
Resource
win10v2004-20240802-en
General
-
Target
msimg32.dll
-
Size
2.3MB
-
MD5
c9dfb256c42b16e619d8d4414b34f790
-
SHA1
dd693ea98b7a94af18dffeeb15eef75e2518b8a6
-
SHA256
1b427ec6e11bb5399045d7187afb46bac9b1eac183d68cd76571725d67fd04f0
-
SHA512
e0393bbffa2b582178aa342c897b893b7f69d9d1d2a9191a77fd05439124baeed211f07b506bc28f33dcf51895777a2e9077f106454ee696d5f3f8c28018a0c4
-
SSDEEP
49152:P69FikjsYvjmNN4TuF2GeBiDw0uLnlCgzzO4nkTM+M+69zAx60s50Aah6rBJsNu7:i9sYvj1YDw0inATk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4352 OpenWith.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 2252 4572 regsvr32.exe 82 PID 4572 wrote to memory of 2252 4572 regsvr32.exe 82 PID 4572 wrote to memory of 2252 4572 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\msimg32.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\msimg32.dll2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2440
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4352