Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 20:07

General

  • Target

    RogueKillerPEShell.dll

  • Size

    3.2MB

  • MD5

    4c2b29faa1dc61f042eaf209407efc1c

  • SHA1

    de8ddbb009339774a175c413039ae8517d7685f3

  • SHA256

    3c649b9ecc218d6ec4051eece717e900a65943161d15cd57d467f49a8e73e489

  • SHA512

    cb8dadf3eaee9870b13df7f3db72ea8353a558530c64b0b7a7ec09033aafdfcf9ba0f3cdac0032143b98e9af36b3e8980a05cd428e57b95346e547e8eafba805

  • SSDEEP

    49152:pS6VqJVtygaZz6ee3mKeIYv1Xdp2liKwzCaqZR/56VM6w7AeYWxpXZwR+iPLbWTq:X7CeN1A6ViA+UbTb

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\RogueKillerPEShell.dll
    1⤵
    • Modifies registry class
    PID:1228

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads