Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-es
  • resource tags

    arch:x64arch:x86image:win11-20241007-eslocale:es-esos:windows11-21h2-x64systemwindows
  • submitted
    21/12/2024, 21:08 UTC

General

  • Target

    langs/VBoxClient-x86.dll

  • Size

    669KB

  • MD5

    8499bcb782e639b57abb8b503d410eb8

  • SHA1

    a4e3363a30c02fe999eedfed50a8dd200f4c46c9

  • SHA256

    84b47308abc293515fa8b682d7ede3a53fed426a7073cfec466bcde681da715f

  • SHA512

    344132b5148ce38174230efb51b0aaa85709bbe2f34c09ff47e9390324ee1139423717cc461e7f276db80fcb86a0509ca92cd84a18b7657d3da65c8fe427fc39

  • SSDEEP

    12288:BfWBgRdNVSnkjiLSRHhWsfl4GhW0TAZoq:BfWBgRdNUnkHWsfl4Gg0ED

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\langs\VBoxClient-x86.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\langs\VBoxClient-x86.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.