Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
39394e1b538f47ca4759f4ba706a440b48626c2a7c897b5374c63f9bc20efad6.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39394e1b538f47ca4759f4ba706a440b48626c2a7c897b5374c63f9bc20efad6.dll
Resource
win10v2004-20241007-en
General
-
Target
39394e1b538f47ca4759f4ba706a440b48626c2a7c897b5374c63f9bc20efad6.dll
-
Size
553KB
-
MD5
2e617d591af58deefbd8a8012c143c25
-
SHA1
b3f61feed13617088400117794af132ce2e42bb8
-
SHA256
39394e1b538f47ca4759f4ba706a440b48626c2a7c897b5374c63f9bc20efad6
-
SHA512
9cf77bca17ec4dba94c8d9d6db94dde6c19ee01aa4549e051817f02f78e550135892ed21d63e392dc95f1a5cabf1230dfc972a45844c0a9dc2a56fedce60fca6
-
SSDEEP
12288:YHfy5PsvRyi8jiP42ZFTjYaD3lRwLOvz1Dc:Ya5PsEZK4aBYs+6hD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0BC5E7D-770B-4D4D-A013-9CDA768E3F08}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0BC5E7D-770B-4D4D-A013-9CDA768E3F08}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\39394e1b538f47ca4759f4ba706a440b48626c2a7c897b5374c63f9bc20efad6.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0BC5E7D-770B-4D4D-A013-9CDA768E3F08}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0BC5E7D-770B-4D4D-A013-9CDA768E3F08} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0BC5E7D-770B-4D4D-A013-9CDA768E3F08}\ = "KwShellExtDll" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2576 2416 regsvr32.exe 30 PID 2416 wrote to memory of 2576 2416 regsvr32.exe 30 PID 2416 wrote to memory of 2576 2416 regsvr32.exe 30 PID 2416 wrote to memory of 2576 2416 regsvr32.exe 30 PID 2416 wrote to memory of 2576 2416 regsvr32.exe 30 PID 2416 wrote to memory of 2576 2416 regsvr32.exe 30 PID 2416 wrote to memory of 2576 2416 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\39394e1b538f47ca4759f4ba706a440b48626c2a7c897b5374c63f9bc20efad6.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\39394e1b538f47ca4759f4ba706a440b48626c2a7c897b5374c63f9bc20efad6.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2576
-