Analysis

  • max time kernel
    95s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 06:30

General

  • Target

    4c131b150653526c6f897b75488757e2de4b84e564921d3d45571fc747011fd5.dll

  • Size

    872KB

  • MD5

    62f5be54d15be8c3069a87554f1ee1b7

  • SHA1

    e8cc2a831f3e8db21c2e1abc3b884452c7066549

  • SHA256

    4c131b150653526c6f897b75488757e2de4b84e564921d3d45571fc747011fd5

  • SHA512

    79564035a49e931ff970d929ea666e9b0e5b6c5267b9f655b34d3be6b43a0a39e8409e38f9c72dda17ef28efd61a737f20959b57457a1221a909c0d817df832c

  • SSDEEP

    24576:YM516PyBxKOySlT0ews0LiKbjrKSwF/JM:zdBxnySlT0ews0LiKbj2SwdJM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4c131b150653526c6f897b75488757e2de4b84e564921d3d45571fc747011fd5.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\4c131b150653526c6f897b75488757e2de4b84e564921d3d45571fc747011fd5.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads