Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 05:59

General

  • Target

    LAVFilters64/LAVAudio.dll

  • Size

    298KB

  • MD5

    48ff4453f194c324807edb5d72baed84

  • SHA1

    9be09dd1bda71e888a7358726a4d4fb5e2cb8e36

  • SHA256

    6da547e97feb50061d8a6810148f659ac2585b846c642534e4675369b8201e75

  • SHA512

    fcda4ddac88c15623451fa28e603b30f30118cf7ba933c5b73082d9e2a8f15dfe1c8646a41ae78000df69398c6a01a0e9d96e009b31c04f7db23a0eef8412559

  • SSDEEP

    6144:NbbABuFv4u8x1Vcj0kkqx7p04LmOc/Vxno:VABu98NchX44Ito

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 29 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\LAVFilters64\LAVAudio.dll
    1⤵
    • Modifies registry class
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads