Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 14:43

General

  • Target

    install/AutoItX/AutoItX3_x64.dll

  • Size

    512KB

  • MD5

    f11ae50df86a3bf2aa00625e54d7ebb4

  • SHA1

    9812f16df2b0d1eeb75931348096128448d1179d

  • SHA256

    5c1acd56bf432462e59e05e72d486fad670c4dd7c556df3d3270b827d1bbc555

  • SHA512

    6e6ea547a758e95d75952164ebe5e928dbf46da3875c5aba7332755f5e6a5a98587226cf278ad99f4155f39e42f96f2ece0740554e0531f1293fc762a36bdc01

  • SSDEEP

    12288:rqlTSwWo+9Ma61G0I+r0AYODI8u1zTJsQoHoJtdM5Jca+3E:r+FWo+9eIArFcE5Jca+3E

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 61 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\install\AutoItX\AutoItX3_x64.dll
    1⤵
    • Modifies registry class
    PID:2780

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Replay Monitor

Loading Replay Monitor...

Downloads