Analysis

  • max time kernel
    94s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 21:30

General

  • Target

    App/UltraISO/isoshl64.dll

  • Size

    151KB

  • MD5

    c0fc6c67bd9d9fbc4f8ad44232d49d11

  • SHA1

    e5ad2b56cc20652401ee5c60fe118cf3fb474a7b

  • SHA256

    50df2e7ba2ab1892dd1e8c03be51a1dfa9c1ecc501d5166cd5e69badb4a8c503

  • SHA512

    74bc8d2d93c870f0449582b6de60ade9b0322a5cca945beac8842ccd4577569ea97a7089163dcff8b0115ebbaf2ae75d09ae5214efcb8ea6902c80a2cc0e5586

  • SSDEEP

    3072:kgShcvZ9+VtiRdCGD+PneNZ5gTqZUl2vIVPGsSbGv/PI7brluMDCFjV:W2Z9+VtiRj+2NZ5gTqZUl2vIVPGsSbaf

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 62 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\App\UltraISO\isoshl64.dll
    1⤵
    • Modifies registry class
    PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads