Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 05:28

General

  • Target

    gadget32.dll

  • Size

    86KB

  • MD5

    fc731b91903a20243f4a67e39363fea0

  • SHA1

    c826b26f72c2903a17f92a596df055e127336cf6

  • SHA256

    87ac0ee1110ba9bb784ce6eecb4f2ce2d1d030e27b7720975e098dda4f62262b

  • SHA512

    0d1373bbd204c838b145db94a6cc0107f52bed7ca75eb0a9b2a785cd78dbb347adfd810fe0cb5c5f0368c81f7c7e446c30bfe7c3d996612ea6c394989bff407f

  • SSDEEP

    768:MuNzIJWjuJuQ1lTLhiEPjPkn6nSuSzGEAkPTbvLYapE9BSR12ikg7bgmkD6xIvif:ZJUTLxb+6nSQITnNG9s3kIalA5D/bG

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 56 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\gadget32.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\gadget32.dll
      2⤵
      • Modifies registry class
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads