Analysis
-
max time kernel
16s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
0a3ec55408bbf267828a75bc1a85191ad33748675a9cec437712eb968e0d511d.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0a3ec55408bbf267828a75bc1a85191ad33748675a9cec437712eb968e0d511d.dll
Resource
win10v2004-20241007-en
General
-
Target
0a3ec55408bbf267828a75bc1a85191ad33748675a9cec437712eb968e0d511d.dll
-
Size
597KB
-
MD5
622abcb621a1c91327009f43d013ea36
-
SHA1
0c6045fb01aa5a01297cbcd59e931d5601a2f6bc
-
SHA256
0a3ec55408bbf267828a75bc1a85191ad33748675a9cec437712eb968e0d511d
-
SHA512
24afd44f0df8c00231219738352b7f687890d712aecdf68066f39c076a9f89d5b6d21b1943c8c23dc364779bde62e99f47d059416fbf16931a4ea49fd32971fa
-
SSDEEP
6144:DBXHTRFFSm+lCVffGxLzTbfaq7rO14O3t+qOBQjb6F2waRD3wn:dXtFfVMzTLaCrWU2wahgn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00020021-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00020020-0000-0000-C000-000000000046}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00020003-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002000D-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002000F-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00020001-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00020001-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002000F-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00020021-0000-0000-C000-000000000046}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00020000-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00020000-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002000D-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00020003-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00020020-0000-0000-C000-000000000046} regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2328 2300 regsvr32.exe 30 PID 2300 wrote to memory of 2328 2300 regsvr32.exe 30 PID 2300 wrote to memory of 2328 2300 regsvr32.exe 30 PID 2300 wrote to memory of 2328 2300 regsvr32.exe 30 PID 2300 wrote to memory of 2328 2300 regsvr32.exe 30 PID 2300 wrote to memory of 2328 2300 regsvr32.exe 30 PID 2300 wrote to memory of 2328 2300 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0a3ec55408bbf267828a75bc1a85191ad33748675a9cec437712eb968e0d511d.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0a3ec55408bbf267828a75bc1a85191ad33748675a9cec437712eb968e0d511d.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2328
-