Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66.dll
Resource
win10v2004-20240508-en
General
-
Target
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66.dll
-
Size
1.1MB
-
MD5
ea50db1b45a9305ec2daafdcd2f567ff
-
SHA1
13fe1aa6e37d5de3d6f8473b3016a45af8fc70b7
-
SHA256
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66
-
SHA512
1c9e63d9c5f7216c10157d7305dad8254f8cb8dc4443e4acb98901970cf9d0c8a08d4040a5c6ab407a826ec030e6324b2392c9be427d1fcaff137d9eb132c70e
-
SSDEEP
24576:k2/JIvJYCjH0SicpmgGmAh1tYd7pRkeM9:kwJIvJDH0pJtopK
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A}\ = "Weasel" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A}\InprocServer32 regsvr32.exe