Analysis

  • max time kernel
    126s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2025, 02:39

General

  • Target

    Codecs/FLVSplitter.dll

  • Size

    376KB

  • MD5

    0bfdc3410a7edfbc05414cce6f76958f

  • SHA1

    e70ce8d63394c4e48a3f2d6ec467db3ce801f988

  • SHA256

    4781757e283f44bb5d85bf8600e89a2483d0742b13a02b446005dcb02a72d9b3

  • SHA512

    6df1bcee3b82b451f4098e05b9335824ffeb1239cbe67003b053473622d2360e7a5e03173dae8ff7aafdd4f959a39e73a68e291bff4f0d5824688e1b8b39b097

  • SSDEEP

    6144:h9hcFIuTT6v9VyUgf10zCpN138+VRjWL09y0Ur6ebjZDkjYOE:hruIuTT6uUWnN2+V5Py0CjyYOE

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 25 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\Codecs\FLVSplitter.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\Codecs\FLVSplitter.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:4776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads