Resubmissions

11/09/2024, 18:46

240911-xe5y3swfpp 7

Analysis

  • max time kernel
    127s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 18:46

General

  • Target

    DolbyAPOvlldp120.dll

  • Size

    1.4MB

  • MD5

    065519b0353217f21554d6bff26fffbb

  • SHA1

    8ac10c163c77f8573315ee3e3bee0106aefe4662

  • SHA256

    e8e4ff12241000f7be4a1c7eb92df63006def111f627028634edaf967bab9b97

  • SHA512

    3f07cdf8fc0ef0f984fb4d2f947ffec54783be74dc20481b801f999cd3d95247660e1eaf05fb11e568965a929ffe8d66cbe7b8adf9672f9e3938b122e8502203

  • SSDEEP

    24576:XwUFGvCKC7Detp4cHxDqzU6EXOfLY6Y8A57sz7Lyj46K3NP22suMJn:Ytp7xD4U6E+fLA8A57snLyj4NPnY

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 33 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\DolbyAPOvlldp120.dll
    1⤵
    • Modifies registry class
    PID:4148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads