Overview
overview
10Static
static
3Loader_dll...es.dll
windows10-2004-x64
1Loader_dll...ce.dll
windows10-2004-x64
7Loader_dll...er.dll
windows10-2004-x64
1Loader_dll...st.dll
windows10-2004-x64
1Loader_dll...cs.dll
windows10-2004-x64
1Loader_dll...47.dll
windows10-2004-x64
1Loader_dll...12.exe
windows7-x64
1Loader_dll...12.exe
windows10-2004-x64
10Analysis
-
max time kernel
92s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
Loader_dll/MsMpRes.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Loader_dll/TableTextService.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Loader_dll/WordpadFilter.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Loader_dll/addition/EppManifest.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Loader_dll/addition/MsMpLics.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Loader_dll/d3dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Loader_dll/loaderV12.exe
Resource
win7-20241010-en
General
-
Target
Loader_dll/TableTextService.dll
-
Size
649KB
-
MD5
ac46ab38c3258e6e201243546a705cc9
-
SHA1
6df36de077c38ae6039b1682c940e7694cd40700
-
SHA256
73762426730d7ee614e5d98e9722da1d52bd1dcbed0c735a5cf74d07e8e76a10
-
SHA512
18def451851e5210ab7724cf0c92c2b4cf003df83cb3857e990c84a6fd3cb84d48e79df1bac0d216429abadcef1a85504e7cc9c7e591ba95f4e86ccd618f2ff4
-
SSDEEP
6144:YZZ4gPlUMNfNBepnXotTcHFpOFhl5d39rIX/ZZQ:YZbWMN3eKtTclUFhfdtc/ZK
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E429B25A-E5D3-4D1F-9BE3-0C608477E3A1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E429B25A-E5D3-4D1F-9BE3-0C608477E3A1}\InProcServer32 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4412 regsvr32.exe