Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
7bda5f871df3ef8e2bceadc8a4b7b43d59f9b347e49fee8ee7aff0d3fe26d779.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7bda5f871df3ef8e2bceadc8a4b7b43d59f9b347e49fee8ee7aff0d3fe26d779.dll
Resource
win10v2004-20241007-en
General
-
Target
7bda5f871df3ef8e2bceadc8a4b7b43d59f9b347e49fee8ee7aff0d3fe26d779.dll
-
Size
249KB
-
MD5
5153696d3376ecc70163f6fb86dc92b7
-
SHA1
526dddb177df0e8892df9d6508a919874ec1cc6f
-
SHA256
7bda5f871df3ef8e2bceadc8a4b7b43d59f9b347e49fee8ee7aff0d3fe26d779
-
SHA512
fe420f1e72876cb007655245466bdd951577f98557d76a9bbb0f8316f2e1366564409f6fcc90b49e8d7b81fbd13202c4d4b7c1c4d3d1a78afbf76b4a7e2073cd
-
SSDEEP
3072:2p/iH4sGUn830JzUJ0buvCi+BfDS4iy1nACm:2EGUIR0buiviyo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagProvider.1" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2352 2856 regsvr32.exe 30 PID 2856 wrote to memory of 2352 2856 regsvr32.exe 30 PID 2856 wrote to memory of 2352 2856 regsvr32.exe 30 PID 2856 wrote to memory of 2352 2856 regsvr32.exe 30 PID 2856 wrote to memory of 2352 2856 regsvr32.exe 30 PID 2856 wrote to memory of 2352 2856 regsvr32.exe 30 PID 2856 wrote to memory of 2352 2856 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7bda5f871df3ef8e2bceadc8a4b7b43d59f9b347e49fee8ee7aff0d3fe26d779.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7bda5f871df3ef8e2bceadc8a4b7b43d59f9b347e49fee8ee7aff0d3fe26d779.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2352
-