Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 18:46

General

  • Target

    4a0a36599939d6aed57136402438c7c231a545914eaa1df10d8324e5ebb60f6c.dll

  • Size

    1.2MB

  • MD5

    1e70b7bdcf63f9058482af249cfed1a9

  • SHA1

    5cb3d00c880c448e85b633755ce187202ea30f22

  • SHA256

    4a0a36599939d6aed57136402438c7c231a545914eaa1df10d8324e5ebb60f6c

  • SHA512

    44eff5eb253ecb785179441c458a4d7be5651c41c696978dd237218e7dad9d8a1968e3b96fde9547fec0ef119b3376779e82c290eb72ed6bda8abab0fcaf6767

  • SSDEEP

    24576:JbYRleg4H/qZHeK+dVxodFx2mi8WJhFwmuK/DHvb1MrzM+SU5L5tj112jGLF2eo9:0UQH1dFx2mi8kwybqzM8L5tj112jGLF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4a0a36599939d6aed57136402438c7c231a545914eaa1df10d8324e5ebb60f6c.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\4a0a36599939d6aed57136402438c7c231a545914eaa1df10d8324e5ebb60f6c.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads