Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2025, 00:05 UTC

General

  • Target

    123/psmachine.dll

  • Size

    250KB

  • MD5

    a47b9c0e96070d89e9dc65358c81538d

  • SHA1

    719f2688f1bbb7e65acc9cacf1e50ad461d5ee7a

  • SHA256

    ea5f4746aa8ccc63d4265d7bf860df53249c284924d824cffd5b11fdd980fa4e

  • SHA512

    cbf0b4566259d45db48d9643e1a32aefef4dd1b869f79ba6c77096bc0e9f8b351fafa0b4b72c9aaefcea7f0477e7af9e23b7e97858a8d5f422895b2ea4e63300

  • SSDEEP

    6144:8X2kclmHZ3aTIOOYO5OI4ENxNGEilD/am21:8X2kccHdaTIOOYdgxwE2Q1

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\123\psmachine.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\123\psmachine.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.