Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 09:04

General

  • Target

    x64/CommonProgramFiles/SpeechEngines/Microsoft/spcommon.dll

  • Size

    106KB

  • MD5

    d5965cd690d4f5b7a79be35d5507f585

  • SHA1

    741aa9431c7417a90d1625b34cd0b78e4e7fa784

  • SHA256

    a0475d7513cba997dcb16cf4a5730e9b5f595a5739c5dd8a7427b4c873695009

  • SHA512

    22e9dd787c4006b8a32a1f1977bb28625d72d1c73592acadf34aa74c1e6f79ea7556eadbae1e073fba4122ab98d8464f51069a3946742039d353cb7f2bc69924

  • SSDEEP

    1536:76QQirIRAzZ4UsgoWw6Co9MaQL4jrB7LL5uqaSS5Wm7b0:76Qr0aZtsg6TJ8jrB7LL5bgWm7

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 32 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\x64\CommonProgramFiles\SpeechEngines\Microsoft\spcommon.dll
    1⤵
    • Modifies registry class
    PID:872

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads