Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 06:28

General

  • Target

    $SYSDIR/PassGuardX64ForYBXY/PassGuardX64.dll

  • Size

    3.3MB

  • MD5

    c51656b26119aacd1a46c0e0a595a39c

  • SHA1

    b75d8b77297d2fd7f6f7763a3d50ea06beb396e6

  • SHA256

    665e7de614a196741af1a52b48f91453136d0bce3e0048699b3b115e3c7078b9

  • SHA512

    a2a3747dc518249599097bec700cb09b1551b6d9052d0225f5e4abf2d458acff6edd4867db81685bb94c71c6dc5302f868be8de170ca6804ab79288c5a5afaf7

  • SSDEEP

    49152:WYbgS0xNu63rtrgwNAOa1qXEeaenHgJEomipl4LgziNXfzEurRnKtAGeXbyg10:WYS5aG7onlw75fzE+RKtALLyy0

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies registry class 64 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$SYSDIR\PassGuardX64ForYBXY\PassGuardX64.dll
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2180-2-0x000007FEF6FD1000-0x000007FEF709A000-memory.dmp

    Filesize

    804KB

  • memory/2180-3-0x000007FEF6FD0000-0x000007FEF731C000-memory.dmp

    Filesize

    3.3MB

  • memory/2180-1-0x000007FEF6FD0000-0x000007FEF731C000-memory.dmp

    Filesize

    3.3MB

  • memory/2180-0-0x000007FEF6FD0000-0x000007FEF731C000-memory.dmp

    Filesize

    3.3MB