Resubmissions

26/07/2024, 09:06

240726-k2ts4ssbnb 10

20/06/2024, 20:05

240620-yts4havhph 10

Analysis

  • max time kernel
    1372s
  • max time network
    1164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 09:06

General

  • Target

    GlobalProtect64/lib64/RTDService.dll

  • Size

    442KB

  • MD5

    7188ba7f46dbbe324472c22a814a884a

  • SHA1

    dc855cbeef47a1945baebbf1b7abe7f9ed718549

  • SHA256

    bf9b6a71f3c71ad3cbdb12f1d37cca025aafc1afc0120c783acb83e8ce54c3e5

  • SHA512

    bba1af40d5f182380e20587282e8cb037f0dbf91ec28ae2ef2f88336fa155e8dcd4e4ffe27b6a7e3b2a3be67695e1c69c1d0a37d6bf6eb4ceafbf4543095e5ca

  • SSDEEP

    6144:+mXdszM4ebIDp9FB7qJG8Ti1rrvcjr2s1Hw0q6aCxWRCmTYh5U:+g2MlbkFB7qJGZpGalR7

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 22 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\GlobalProtect64\lib64\RTDService.dll
    1⤵
    • Modifies registry class
    PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads