Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2024, 11:40

General

  • Target

    $_0_/dl_peer_id.dll

  • Size

    85KB

  • MD5

    c6e0c16fcfe918d40819ededec3ae240

  • SHA1

    a09f398b3a8ed4520a7142325d1f73667571cf35

  • SHA256

    c425bc774fc681798797fd4c7e0c11e3318fa4c184b61f23b5cb5c641c8dbcb9

  • SHA512

    404a4b9525a3c88c8f488e02273dcac5e2659bec563471f2629621736fdebadacbfba0e253b6ead893bfc69bf01e6d45852699bdc77d3c6ea7f7bfb19850d2c6

  • SSDEEP

    768:5m/NxWeyBQHRv4yqLSypchegiicB+JQYqPo+nZr5FwqNjfyOO+666laCiNmtdt81:5m1UXiRv3iLcJQ8wDNTxotrRqk3p6DH

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 44 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$_0_\dl_peer_id.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$_0_\dl_peer_id.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads