Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
b079a80415982a8aa3daa150953b48701d7502aa58e1d562de8f911c132f10b0N.dll
Resource
win7-20241010-en
General
-
Target
b079a80415982a8aa3daa150953b48701d7502aa58e1d562de8f911c132f10b0N.dll
-
Size
123KB
-
MD5
fd69ce71d5c0f7df5bc39843f6db52c0
-
SHA1
2a58116ba8738dba53cff79533b8366f9e3d3530
-
SHA256
b079a80415982a8aa3daa150953b48701d7502aa58e1d562de8f911c132f10b0
-
SHA512
5cf0bc4e465b11b8b06f0d4302d04b19d0b74ef477b9dbcf7e86a8f728cbdc3ae83e62b2df1ae68c26047ac6f8b9bba9c1131317f35b1c679e4491275fbb6974
-
SSDEEP
1536:+k4CEi1tQDbHLiYXGsnv5u3lFf7A0jbgEQ277yKPJe6TL:+k4CEi1giwzvE7fLbaKJL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2592 regsvr32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2184 regsvr32.exe 2184 regsvr32.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2192 2592 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2184 2524 regsvr32.exe 30 PID 2524 wrote to memory of 2184 2524 regsvr32.exe 30 PID 2524 wrote to memory of 2184 2524 regsvr32.exe 30 PID 2524 wrote to memory of 2184 2524 regsvr32.exe 30 PID 2524 wrote to memory of 2184 2524 regsvr32.exe 30 PID 2524 wrote to memory of 2184 2524 regsvr32.exe 30 PID 2524 wrote to memory of 2184 2524 regsvr32.exe 30 PID 2184 wrote to memory of 2592 2184 regsvr32.exe 31 PID 2184 wrote to memory of 2592 2184 regsvr32.exe 31 PID 2184 wrote to memory of 2592 2184 regsvr32.exe 31 PID 2184 wrote to memory of 2592 2184 regsvr32.exe 31 PID 2592 wrote to memory of 2192 2592 regsvr32mgr.exe 32 PID 2592 wrote to memory of 2192 2592 regsvr32mgr.exe 32 PID 2592 wrote to memory of 2192 2592 regsvr32mgr.exe 32 PID 2592 wrote to memory of 2192 2592 regsvr32mgr.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b079a80415982a8aa3daa150953b48701d7502aa58e1d562de8f911c132f10b0N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b079a80415982a8aa3daa150953b48701d7502aa58e1d562de8f911c132f10b0N.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:2192
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5242f5fffb519c398b15866ca79206620
SHA148a4f008d6c304992499f820ebc7a707e358545e
SHA2560c8b4e7d06339dadeb05599c49e3e167bb1bc9153b418fdcf37e9e4e2622cbf6
SHA512d7b86f66e11a6eea286ac2d911241c336c703c30a8f343529fdb1323b1c724f3fd8d19a8f76b998a57c04ca317681f5d99066c8fafabce2ff445599fbce5bc47