Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 03:09

General

  • Target

    24d46246bc05c4e3b67643cae1d13bb0N.dll

  • Size

    681KB

  • MD5

    24d46246bc05c4e3b67643cae1d13bb0

  • SHA1

    ce522ad00bd8748d2936bb21a66e53f8fb137f13

  • SHA256

    d81896305cdcf7dab9402e359d4f83af1c430bbd1b1efe18e778c285e257b324

  • SHA512

    c81c9bd421e2b84d277ff999d632febe5de2f3a2190c040b4f3475edd46c127162e0051681841e72b8a260209304b1eac52f6dfb12c6f1e6fcc13925071677f8

  • SSDEEP

    6144:DvRVevCGg+9++Pxn7wvKouwMoHbBanrB1Ze8zEr5ZULTJJB+LT0WuM4fnf4A2t1c:DvLeX347QZ7/2t1Lq1Lu0

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 17 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\24d46246bc05c4e3b67643cae1d13bb0N.dll
    1⤵
    • Modifies registry class
    PID:1092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads