Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 23:59
Behavioral task
behavioral1
Sample
233dd90d3640904ad0dd9f37e744bb72f7828be443b6d1c32bcb63ae0b2f3d2c.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
233dd90d3640904ad0dd9f37e744bb72f7828be443b6d1c32bcb63ae0b2f3d2c.dll
Resource
win10v2004-20241007-en
General
-
Target
233dd90d3640904ad0dd9f37e744bb72f7828be443b6d1c32bcb63ae0b2f3d2c.dll
-
Size
135KB
-
MD5
680fb4bb59383c48303d0353cdc18bf8
-
SHA1
34114a1dbe0680f886d650f4bbb6708ce06c0bc2
-
SHA256
233dd90d3640904ad0dd9f37e744bb72f7828be443b6d1c32bcb63ae0b2f3d2c
-
SHA512
997287f465b44301bae19dd58e66d46083d1ca99c5653592bb3ab6666382453c1a509e27575f671a89b5c60a675182fb89fbca1db1f98d4c35bd3aef2519bc82
-
SSDEEP
3072:81AaJomSE8ibVRWKpyaZH35mLTi8Mir3m3aWQXZ6Yfd/TTai8/c:8qmSE8iJEKpyo5ATEir3KaVXZ6+Vv8/c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid Process procid_target PID 2368 wrote to memory of 2284 2368 regsvr32.exe 82 PID 2368 wrote to memory of 2284 2368 regsvr32.exe 82 PID 2368 wrote to memory of 2284 2368 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\233dd90d3640904ad0dd9f37e744bb72f7828be443b6d1c32bcb63ae0b2f3d2c.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\233dd90d3640904ad0dd9f37e744bb72f7828be443b6d1c32bcb63ae0b2f3d2c.dll2⤵
- System Location Discovery: System Language Discovery
PID:2284
-