Analysis

  • max time kernel
    1151s
  • max time network
    1157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 20:01

General

  • Target

    bin/dinput8.dll

  • Size

    128KB

  • MD5

    c9b973183908a6631b31ca29f863b4d1

  • SHA1

    6b32c09f1404be8f9eb21e6c1b8955f4bf00e51d

  • SHA256

    9fd9e02353b7d39fe07b9667f7ea2697229a7f2d0e7d389eb79eb212b1bb181d

  • SHA512

    aa63cfba16d5c134b7478fc27b32e4b1e588f5910205e050d94b59a15f95d886ecaa4c2d494c7c3496b2bb8f386e7a540ec999190714b6e048c6bc07d1a43755

  • SSDEEP

    3072:OBK5kXMCQ9hTn7TYgESRbApwUEfo9c+SJwVvjPIB:8K5kXMl5TYgXR02UWPrJAjPI

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\bin\dinput8.dll
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4820-1-0x00007FFCCF180000-0x00007FFCCF1A5000-memory.dmp

    Filesize

    148KB

  • memory/4820-0-0x00007FFCCF181000-0x00007FFCCF182000-memory.dmp

    Filesize

    4KB