Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 08:23

General

  • Target

    $SYSDIR/NXYUKEY_HB.dll

  • Size

    74KB

  • MD5

    17f390de566bbc388bca8ea0e1d39fbd

  • SHA1

    6f07a83dad22a592cb252a6dfdeef43581603df8

  • SHA256

    4098bb76fdc46e47c981b645eef1234f7981fcaea69e9c8809f705f277995d9c

  • SHA512

    5954809a23fbc21c9c621473e27faa4cf4460a5c712608492887333dda84aba041ec4394f45ac2593703f0a4db7625c2d63be65f263c1cd0a9dc904d3e047aa1

  • SSDEEP

    1536:TqhtEFhB329t/iZC9nW1BtaIU+3zkx8/PzI6er:Tqhr9ZiZogBtaIU+3zw8k6e

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 41 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$SYSDIR\NXYUKEY_HB.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$SYSDIR\NXYUKEY_HB.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads