Analysis

  • max time kernel
    146s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2024 19:02

General

  • Target

    zen.win-specific\zen\AccessibleMarshal.dll

  • Size

    29KB

  • MD5

    73fd7f799de7bf6b397c7a115aaee881

  • SHA1

    e98120f3175957f46d5409635771b784bfc6f0ba

  • SHA256

    f9b13f6e00fb3ee6acb4915b75867400f49d0367b2d3e330f878eb4ae583d9ae

  • SHA512

    809bc8773fbac84442e120a437a431ed710d7fe96c11e4df92eda82b362845d137eb641ccf635e3fb9931887810793eb081b9a387d2373586f3524ed4541f03c

  • SSDEEP

    384:PmMUbpeTLB5+Vra/vfjMdfj9ycDieIL0Ieu4ExGGmLu5w5k2mNDsSofouswa8:PmMupezvfAhjfD5I2GLyGheSoQud

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 25 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\zen.win-specific\zen\AccessibleMarshal.dll
    1⤵
    • Modifies registry class
    PID:1508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads