Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 11:16

General

  • Target

    e761b8dbba3d589518e612343808e95b56a75a27cc282d52b51d37240ed7ef3c.dll

  • Size

    1.4MB

  • MD5

    25dbf5eb66f00fe38d0d919b65838b6f

  • SHA1

    2d3a59ac5694ed8e9b526262e716a827f1422957

  • SHA256

    e761b8dbba3d589518e612343808e95b56a75a27cc282d52b51d37240ed7ef3c

  • SHA512

    351cb225cc779eae4befb7401c9aa917d9cf11d59f3251ad0d9f96bd1ac6a6592cfcb8ab0d3c7fe9a396625f3ca5f8d9fa8249a4168751da98995ac29dc6eb34

  • SSDEEP

    24576:sJLHyhGvu4kNsYS8MSDdY5G8q3nSlSBXa1IAYyTCwk+qIgvozb8U3G/cGFqtz+VP:s8hGvrIvSlDTCrLwzcqtzJQHk/g

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e761b8dbba3d589518e612343808e95b56a75a27cc282d52b51d37240ed7ef3c.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\e761b8dbba3d589518e612343808e95b56a75a27cc282d52b51d37240ed7ef3c.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads