Analysis

  • max time kernel
    134s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-09-2024 16:44

General

  • Target

    DeviceSelector.exe

  • Size

    518KB

  • MD5

    ac1ccdd400ddf4f7fbe82af9d3a97b84

  • SHA1

    5d20a16e1cd0ac84e545762ca84c0ab95f5e3786

  • SHA256

    8931df36c0af402faf328aa1e94c211ea3df91fccc21ce3194621daff4e49a9f

  • SHA512

    b475517e9368fba6f4d9add898d7d4fc9dc402f1c510571e986e8693cbccf61d65e381dec3b191504c8ddf67f7f915ee9162c1699fc2ef5ef73c57156dff788b

  • SSDEEP

    6144:5zKbJqbPiX2SljtWOOJsABtgY1DNar8IZc1Jfi645XEKD8Wg9/JF2weTzd/nuxOl:sqbPiX2g57BY1D4HZ8fixB0W8Z8f

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 37 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DeviceSelector.exe
    "C:\Users\Admin\AppData\Local\Temp\DeviceSelector.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\EqualizerAPO.dll"
      2⤵
      • Modifies registry class
      PID:3932
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3dc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2924-1-0x0000020AA0410000-0x0000020AA0420000-memory.dmp

    Filesize

    64KB

  • memory/2924-0-0x00007FFD783A0000-0x00007FFD789CE000-memory.dmp

    Filesize

    6.2MB