Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 14:34
Static task
static1
Behavioral task
behavioral1
Sample
090bd25f8a7a798f148508ae388e94d6e7a3cae7b0f2b10757010e39289aa6f5.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
090bd25f8a7a798f148508ae388e94d6e7a3cae7b0f2b10757010e39289aa6f5.dll
Resource
win10v2004-20241007-en
General
-
Target
090bd25f8a7a798f148508ae388e94d6e7a3cae7b0f2b10757010e39289aa6f5.dll
-
Size
45.1MB
-
MD5
fbbd10401ce1b31494d8c9f23d6a8664
-
SHA1
47666e86b636421db480d93851ee5139c5c0a7dc
-
SHA256
090bd25f8a7a798f148508ae388e94d6e7a3cae7b0f2b10757010e39289aa6f5
-
SHA512
2c95831ac6bca0803960732601dc4257cfc48782d4ad8af2295228160f522ee89ce4ff190970e3e5eddb5a1ca828bf539d6565ee6a94e5ed0d313bb021f5dfcf
-
SSDEEP
786432:kUP7GCGO7t0Srkx/tC0SzIdSwh/WxbpNHQD3trzRpwzr:kUP7GCG6iSrkx1hSzYsHQD3t/RiP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1892 1960 regsvr32.exe 31 PID 1960 wrote to memory of 1892 1960 regsvr32.exe 31 PID 1960 wrote to memory of 1892 1960 regsvr32.exe 31 PID 1960 wrote to memory of 1892 1960 regsvr32.exe 31 PID 1960 wrote to memory of 1892 1960 regsvr32.exe 31 PID 1960 wrote to memory of 1892 1960 regsvr32.exe 31 PID 1960 wrote to memory of 1892 1960 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\090bd25f8a7a798f148508ae388e94d6e7a3cae7b0f2b10757010e39289aa6f5.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\090bd25f8a7a798f148508ae388e94d6e7a3cae7b0f2b10757010e39289aa6f5.dll2⤵
- System Location Discovery: System Language Discovery
PID:1892
-