Analysis
-
max time kernel
93s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
dc8fe7eadc1cae8efbe8ee6d7d3951fdbc38359848ae8c5b71fc3e066f8b6e4d.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dc8fe7eadc1cae8efbe8ee6d7d3951fdbc38359848ae8c5b71fc3e066f8b6e4d.dll
Resource
win10v2004-20241007-en
General
-
Target
dc8fe7eadc1cae8efbe8ee6d7d3951fdbc38359848ae8c5b71fc3e066f8b6e4d.dll
-
Size
1.5MB
-
MD5
6dcd9ed457bbac879d2cb4649641ff3b
-
SHA1
b1ed6726be7fcf981dd13b9b25815426cebf9416
-
SHA256
dc8fe7eadc1cae8efbe8ee6d7d3951fdbc38359848ae8c5b71fc3e066f8b6e4d
-
SHA512
f53111a4a74b0d28fbe1ef3dbcbc562d4e92470685de3b6f44dc99f74866aabe21f3acedf184dee7c52e0917beccfe55b0a62f82073015f7593d732fdec7cc5a
-
SSDEEP
49152:6qRTrVL5tj1XUNgASK4CTfVf1WZ6245a6DLx5xf44sQsnoK4FrB:6qRXq5aI5xqI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4612 4104 regsvr32.exe 83 PID 4104 wrote to memory of 4612 4104 regsvr32.exe 83 PID 4104 wrote to memory of 4612 4104 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dc8fe7eadc1cae8efbe8ee6d7d3951fdbc38359848ae8c5b71fc3e066f8b6e4d.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\dc8fe7eadc1cae8efbe8ee6d7d3951fdbc38359848ae8c5b71fc3e066f8b6e4d.dll2⤵
- System Location Discovery: System Language Discovery
PID:4612
-