Analysis

  • max time kernel
    94s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 09:18

General

  • Target

    VnetClinfo.dll

  • Size

    77KB

  • MD5

    b8fdd277eb7fa93f98c3ada83020a9a3

  • SHA1

    5bf85344ad3c5451d3e2b3d0f62783a2bd19301a

  • SHA256

    c6d20217ba118165d6f97067493f663d11b122501384898fe899b0018daa710c

  • SHA512

    2c6afcbb6b73cd87d99078a366973a6c58d3478948c5a20dd42d133f94dfaaad3f6b7b0d92aef75c98a051411a0bce3ff293d331900b3941ed4b0ff1377aa362

  • SSDEEP

    768:Xv3wc77UtCcjS+8mcKgqCm36PcQ9rhRv19ClA1dJ9mQzAjsQ01jUGDQMDL7sQO:X4c77a/8mcZH0o9RjClWnAkaGEMDI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\VnetClinfo.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\VnetClinfo.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3352-0-0x0000000000450000-0x000000000045D000-memory.dmp

    Filesize

    52KB