Overview
overview
10Static
static
3contactsUX.dll
windows7-x64
3contactsUX.dll
windows10-2004-x64
3msidcrl40.dll
windows7-x64
3msidcrl40.dll
windows10-2004-x64
3msn.exe
windows7-x64
10msn.exe
windows10-2004-x64
10msncore.dll
windows7-x64
3msncore.dll
windows10-2004-x64
3msvcr80.dll
windows7-x64
3msvcr80.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 14:56
Static task
static1
Behavioral task
behavioral1
Sample
contactsUX.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
contactsUX.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
msidcrl40.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
msidcrl40.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
msn.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
msn.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
msncore.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
msncore.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
msvcr80.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
msvcr80.dll
Resource
win10v2004-20241007-en
General
-
Target
msncore.dll
-
Size
991KB
-
MD5
deaa38a71c85d2f9d4ba71343d1603da
-
SHA1
bdbb492512cee480794e761d1bea718db14013ec
-
SHA256
1dc120f34b294e964eee949c4d1ebd9c271715d46b38ae082fec2f1d505e8d65
-
SHA512
87b152b642a020e07ad46e9ed5b4a462c12cf0918f82025c230f662eddb3bf4b2d3aa15ca770970beae5988dd5d5d9b7bcaf7a77c6d2f3acf6d12826f3a9ead7
-
SSDEEP
12288:8I4v4jlJ3DBct3wTjlnkwMREiE0ICrNwfSTLRVDRAotTLkWg98JWfK:83t3wVkwmE9FCrN+STVV9AotTLkIJWfK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3720 wrote to memory of 2032 3720 regsvr32.exe 83 PID 3720 wrote to memory of 2032 3720 regsvr32.exe 83 PID 3720 wrote to memory of 2032 3720 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\msncore.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\msncore.dll2⤵
- System Location Discovery: System Language Discovery
PID:2032
-