Analysis

  • max time kernel
    8s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:16

General

  • Target

    $R0.dll

  • Size

    6.2MB

  • MD5

    fb7da9d8c450a58b383ff42d94ebe23a

  • SHA1

    06a106efccf80560ac0fc848b8082916a7574081

  • SHA256

    79107685d8d6adadd68decf5d34739b6519c2467687896ce698f9188a4b6dca4

  • SHA512

    17c0e3bc0614886c9dd2da7965f96b1c4726388d8e6248b8429515026abed9f7327c09c7154d2e6e989a55c4eabed189c49067d5a14451a85b2957784a876475

  • SSDEEP

    49152:Q8GH9teLBY922SM9c50Iq0ikQXvnxC262mGldjoAYkVTIGRGB/Ar95VpeOOQ1KT:xM9bYAUsxYOOyKT

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 64 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$R0.dll
    1⤵
    • Modifies registry class
    PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads