Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-07-2024 18:25

General

  • Target

    $8/ClownfshAPO64.dll

  • Size

    346KB

  • MD5

    2615829ece553a2aac5f9a03cfcacac2

  • SHA1

    4f271a3d659b4c41ae4b578afe3ce34df4d6a1e7

  • SHA256

    2bc1826abffe6bd74c7352607ed15e7b37c205060a8c27c10bf205b067be380f

  • SHA512

    30c3a462604425b4eb20e5732dc519f9a36b77c6c54f26d9a36995631f6222cfbe37a6b2363d68f9956ed5fe2c4323f8051b2cac6acd9c1dc2b3daaac31e4c8f

  • SSDEEP

    6144:XFaPoCUb5nttyhD5Axo3J1+neolsX4m9V5CQVRpKsVjJfuslgH:XkPQb/S6KOeolsXPvUCJU

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 19 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$8\ClownfshAPO64.dll
    1⤵
    • Modifies registry class
    PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads