Resubmissions

11/09/2024, 18:46

240911-xe5y3swfpp 7

Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 18:46

General

  • Target

    DolbyAPOvlldp.dll

  • Size

    1.2MB

  • MD5

    a5a8c0672ed39d9dbf30813e806378dd

  • SHA1

    b620c4a65e034be5b39586917137202df9a84127

  • SHA256

    5ba95f61980c4acedff3946ea14d77194ae8b38742989465a29b0b89c964bba0

  • SHA512

    ba358b89a89696c0cc327f0dd1e9bc7ef1afd3300d3513852855aff62fa553115b8cb6e7372dafd6952cbe4562c65306427d327d743f64dc89fc066bdf11ca95

  • SSDEEP

    12288:9J+/q0iTyDaDQ6aEXk7Nq5CPV7ad93iLOtRkLFy60wzauoBfeQYdoY7:9J+/q0lDU3MP8z3iLOts5Tauvv2Y7

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 33 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\DolbyAPOvlldp.dll
    1⤵
    • Modifies registry class
    PID:4444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads