Analysis

  • max time kernel
    31s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 04:08

General

  • Target

    49927b91ee2f2c136cba4606e19e6ed0N.dll

  • Size

    1.1MB

  • MD5

    49927b91ee2f2c136cba4606e19e6ed0

  • SHA1

    12bf50db3c928cb31e6c55c879b955ea91d262e4

  • SHA256

    b1617b5fd35ac777fde2bd2ddae52adc1859d7b0e86ce1694235640bcb8a2ad7

  • SHA512

    5f9ff6eafa3daad09c75052275044adc64d199138f8198eb8d171ef136ce6bb4ec1c0bd5dcccff06b143c7fa6537287d350dfc2e175ad6dc592d040865cabdaf

  • SSDEEP

    12288:VFHgF/VlMpeK3XCOYU5eWnErl+T5hZzojZuYewu3/gK0uDBNpsmh2radOEKjK6qu:VFAtVlMpeodSmkradOEKjK6aiT8Yj

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 5 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\49927b91ee2f2c136cba4606e19e6ed0N.dll
    1⤵
    • Modifies registry class
    PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads