Analysis

  • max time kernel
    66s
  • max time network
    68s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/07/2024, 10:20

General

  • Target

    7z2407-x64.exe

  • Size

    1.5MB

  • MD5

    f1320bd826092e99fcec85cc96a29791

  • SHA1

    c0fa3b83cf9f9ec5e584fbca4a0afa9a9faa13ed

  • SHA256

    ad12cec3a3957ff73a689e0d65a05b6328c80fd76336a1b1a6285335f8dab1ba

  • SHA512

    c6ba7770de0302dd90b04393a47dd7d80a0de26fab0bc11e147bf356e3e54ec69ba78e3df05f4f8718ba08ccaefbd6ea0409857973af3b6b57d271762685823a

  • SSDEEP

    24576:GE413GbD17f+xGvqTQQc3iFwInAKPfzMc2NAjBWm5HrUq3IbWpeFy:GEVp1/SFwg1bMdN6Wm5HQq3YWUg

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7z2407-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\7z2407-x64.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    PID:5088
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1992

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\7-Zip\7-zip.dll

      Filesize

      99KB

      MD5

      8af282b10fd825dc83d827c1d8d23b53

      SHA1

      17c08d9ad0fb1537c7e6cb125ec0acbc72f2b355

      SHA256

      1c0012c9785c3283556ac33a70f77a1bc6914d79218a5c4903b1c174aaa558ca

      SHA512

      cb6811df9597796302d33c5c138b576651a1e1f660717dd79602db669692c18844b87c68f2126d5f56ff584eee3c8710206265465583de9ec9da42a6ed2477f8