Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2025 20:23
Behavioral task
behavioral1
Sample
c7990f1e72fdfa84552f02f9d11cabb74251b0508291af5366fefcee646f9c91.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c7990f1e72fdfa84552f02f9d11cabb74251b0508291af5366fefcee646f9c91.dll
Resource
win10v2004-20250129-en
General
-
Target
c7990f1e72fdfa84552f02f9d11cabb74251b0508291af5366fefcee646f9c91.dll
-
Size
132KB
-
MD5
274385a8580daa9b30543d6204250280
-
SHA1
4c5c459a7067f1177a49af80a1e44d8916706457
-
SHA256
c7990f1e72fdfa84552f02f9d11cabb74251b0508291af5366fefcee646f9c91
-
SHA512
b7d62a36ecd95bf04c7ee244b4ec6d51e6d9c77be02f73a463d9ee18039a8bc10cb7710862cfc74f91ef49139ff0e9bc48f3228ad071b24fb32b79814908c863
-
SSDEEP
3072:mQPU+oMH1RYDuHlJ4R34t7Rafe6SRlQQIKf0T:mEU+o81RYDuFyRoLgxmQp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3660 wrote to memory of 1704 3660 regsvr32.exe 83 PID 3660 wrote to memory of 1704 3660 regsvr32.exe 83 PID 3660 wrote to memory of 1704 3660 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c7990f1e72fdfa84552f02f9d11cabb74251b0508291af5366fefcee646f9c91.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c7990f1e72fdfa84552f02f9d11cabb74251b0508291af5366fefcee646f9c91.dll2⤵
- System Location Discovery: System Language Discovery
PID:1704
-