Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
4871cf07e9e8cefcc924e03765d1c6de7d9b526f286ef6907f262b1acc111d73.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4871cf07e9e8cefcc924e03765d1c6de7d9b526f286ef6907f262b1acc111d73.dll
Resource
win10v2004-20241007-en
General
-
Target
4871cf07e9e8cefcc924e03765d1c6de7d9b526f286ef6907f262b1acc111d73.dll
-
Size
624KB
-
MD5
506d8040d5510ba281579090ecab3176
-
SHA1
4b1e6748718cb9512a48658bc372846f0dc2fded
-
SHA256
4871cf07e9e8cefcc924e03765d1c6de7d9b526f286ef6907f262b1acc111d73
-
SHA512
6bf9057ffd683244a20d72b6681474e90008e5398cf1dc5ad27d72acbe6f16b4365775043b7228bc1ea78863a26bac7cbc82339e37a6eb191f9e35ecc0e55ceb
-
SSDEEP
12288:5IB8pvskfO5KiRI7XHgZQKhJgeCmJEBjvrEH7QyF:568dswi+LHgZpJEMurEH7FF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 976 4536 regsvr32.exe 86 PID 4536 wrote to memory of 976 4536 regsvr32.exe 86 PID 4536 wrote to memory of 976 4536 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4871cf07e9e8cefcc924e03765d1c6de7d9b526f286ef6907f262b1acc111d73.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4871cf07e9e8cefcc924e03765d1c6de7d9b526f286ef6907f262b1acc111d73.dll2⤵
- System Location Discovery: System Language Discovery
PID:976
-