Analysis
-
max time kernel
31s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
49927b91ee2f2c136cba4606e19e6ed0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
49927b91ee2f2c136cba4606e19e6ed0N.dll
Resource
win10v2004-20240802-en
General
-
Target
49927b91ee2f2c136cba4606e19e6ed0N.dll
-
Size
1.1MB
-
MD5
49927b91ee2f2c136cba4606e19e6ed0
-
SHA1
12bf50db3c928cb31e6c55c879b955ea91d262e4
-
SHA256
b1617b5fd35ac777fde2bd2ddae52adc1859d7b0e86ce1694235640bcb8a2ad7
-
SHA512
5f9ff6eafa3daad09c75052275044adc64d199138f8198eb8d171ef136ce6bb4ec1c0bd5dcccff06b143c7fa6537287d350dfc2e175ad6dc592d040865cabdaf
-
SSDEEP
12288:VFHgF/VlMpeK3XCOYU5eWnErl+T5hZzojZuYewu3/gK0uDBNpsmh2radOEKjK6qu:VFAtVlMpeodSmkradOEKjK6aiT8Yj
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A}\ = "Weasel" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\49927b91ee2f2c136cba4606e19e6ed0N.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3F4CDED-B1E9-41EE-9CA6-7B4D0DE6CB0A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe