Analysis

  • max time kernel
    95s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 10:39

General

  • Target

    SETUP/Support/scrrun.dll

  • Size

    181KB

  • MD5

    baafe7b0932d8457fc0eb73439e086da

  • SHA1

    7dd582a022d93c0e5fc50a50c988aab70e9941aa

  • SHA256

    966c02391779d7fb33f27214e842907ad1d098ca1c4cef97fd5376d0a237e332

  • SHA512

    3367618a3dd6ea6b25977a56bba6813c2952d6d088dbaab3ba7afc80238377c9e1d64f25ea58bddfc5fdeaadb8e7cb2951f1b338fd61bdb28207cfcd272ff93d

  • SSDEEP

    3072:o8oqR+i53WKZM3VMWZWK7V7cZ/guIR/Cq7AcSBOSqHG82tTjJq39mQUGbmDWRP6t:X3WtZWCVUsRYbBOSqHG7tvs39yMSFVtI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\SETUP\Support\scrrun.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\SETUP\Support\scrrun.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads