Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 06:30

General

  • Target

    4c131b150653526c6f897b75488757e2de4b84e564921d3d45571fc747011fd5.dll

  • Size

    872KB

  • MD5

    62f5be54d15be8c3069a87554f1ee1b7

  • SHA1

    e8cc2a831f3e8db21c2e1abc3b884452c7066549

  • SHA256

    4c131b150653526c6f897b75488757e2de4b84e564921d3d45571fc747011fd5

  • SHA512

    79564035a49e931ff970d929ea666e9b0e5b6c5267b9f655b34d3be6b43a0a39e8409e38f9c72dda17ef28efd61a737f20959b57457a1221a909c0d817df832c

  • SSDEEP

    24576:YM516PyBxKOySlT0ews0LiKbjrKSwF/JM:zdBxnySlT0ews0LiKbj2SwdJM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4c131b150653526c6f897b75488757e2de4b84e564921d3d45571fc747011fd5.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\4c131b150653526c6f897b75488757e2de4b84e564921d3d45571fc747011fd5.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads