Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 20:04

General

  • Target

    29143a8ec642ed1217e2868bb82a9328039917bfc4b90e27bfa9c04c41dddd61.dll

  • Size

    738KB

  • MD5

    b24d1b48f1924c541f461415a59a79eb

  • SHA1

    397645be7c2b72476f57ff0a9365db039052842e

  • SHA256

    29143a8ec642ed1217e2868bb82a9328039917bfc4b90e27bfa9c04c41dddd61

  • SHA512

    907244684ce23d5a8512415e548c380c162610df540843f6cbbb8168e2b1eee8f805d8e6ae5f176af5081051687361a2c990dbf61d8de332185bef4caabf3155

  • SSDEEP

    6144:8+nLi5i8PDMP1pGcUd+9++Qf8thalaE8JI4fn34A29o/k2M+mS0:1ig8PoNpt45sp/29ocB+mS0

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 5 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\29143a8ec642ed1217e2868bb82a9328039917bfc4b90e27bfa9c04c41dddd61.dll
    1⤵
    • Modifies registry class
    PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads