Analysis

  • max time kernel
    94s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 02:11

General

  • Target

    ie/MediaWatchV1home3259.dll

  • Size

    85KB

  • MD5

    0ccbd466a8d1c8e1b0a97e5179912948

  • SHA1

    aadf3f723df6aa932ff4b5fc9b60986782b08400

  • SHA256

    ee5517a57df80d2c601bbcb6d73d044fed81736f536a907e738f5f25db1a2638

  • SHA512

    9c3f5a6a5729a511b377a85e9c2c5437b32b291408c63d37a1c03690f69b772b0e938c6376f2cf73349d1e21008dd846868fc99e92fbf04b3a2593dfcb406fac

  • SSDEEP

    1536:X8/1CsEmka04RhRtahrOb8DkhsnHA9glQCt55:Q12mka0ElahrOInguaCt5

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 34 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ie\MediaWatchV1home3259.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\ie\MediaWatchV1home3259.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads