Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 20:42
Behavioral task
behavioral1
Sample
29886509fe1c9628fa5227a052e98e5b7cd7bc04cab15f498eb884d588654b1f.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29886509fe1c9628fa5227a052e98e5b7cd7bc04cab15f498eb884d588654b1f.dll
Resource
win10v2004-20241007-en
General
-
Target
29886509fe1c9628fa5227a052e98e5b7cd7bc04cab15f498eb884d588654b1f.dll
-
Size
43KB
-
MD5
801f793a5ce077d8535dbf9b0144ae3e
-
SHA1
958bc208d7459ddc369c6ee3bdc78c390043192a
-
SHA256
29886509fe1c9628fa5227a052e98e5b7cd7bc04cab15f498eb884d588654b1f
-
SHA512
1682fc11f2876a4ed60dd866982ab5df91bcfde826c6cda4a3ccbc6af9156b944cd85e9d98f4e9f02f9e9f4d77a42ceedbee4317501a9596c56011f72a431a97
-
SSDEEP
768:ugrMCtGv7GDHAfoD+b0yDUAL0igHe1lo145sLPftQWVI4oUVAJZSGmnsfpt:uCtBDQoD+b2C0ig+41wwP1Q/4Ch
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3368 3012 regsvr32.exe 82 PID 3012 wrote to memory of 3368 3012 regsvr32.exe 82 PID 3012 wrote to memory of 3368 3012 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\29886509fe1c9628fa5227a052e98e5b7cd7bc04cab15f498eb884d588654b1f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\29886509fe1c9628fa5227a052e98e5b7cd7bc04cab15f498eb884d588654b1f.dll2⤵
- System Location Discovery: System Language Discovery
PID:3368
-