Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
29143a8ec642ed1217e2868bb82a9328039917bfc4b90e27bfa9c04c41dddd61.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29143a8ec642ed1217e2868bb82a9328039917bfc4b90e27bfa9c04c41dddd61.dll
Resource
win10v2004-20240704-en
General
-
Target
29143a8ec642ed1217e2868bb82a9328039917bfc4b90e27bfa9c04c41dddd61.dll
-
Size
738KB
-
MD5
b24d1b48f1924c541f461415a59a79eb
-
SHA1
397645be7c2b72476f57ff0a9365db039052842e
-
SHA256
29143a8ec642ed1217e2868bb82a9328039917bfc4b90e27bfa9c04c41dddd61
-
SHA512
907244684ce23d5a8512415e548c380c162610df540843f6cbbb8168e2b1eee8f805d8e6ae5f176af5081051687361a2c990dbf61d8de332185bef4caabf3155
-
SSDEEP
6144:8+nLi5i8PDMP1pGcUd+9++Qf8thalaE8JI4fn34A29o/k2M+mS0:1ig8PoNpt45sp/29ocB+mS0
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94C1AFFA-66E7-4961-9521-CFDEF3128D4F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94C1AFFA-66E7-4961-9521-CFDEF3128D4F}\ = "XACTEngine" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94C1AFFA-66E7-4961-9521-CFDEF3128D4F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94C1AFFA-66E7-4961-9521-CFDEF3128D4F}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\29143a8ec642ed1217e2868bb82a9328039917bfc4b90e27bfa9c04c41dddd61.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94C1AFFA-66E7-4961-9521-CFDEF3128D4F}\InprocServer32\ThreadingModel = "Both" regsvr32.exe