Analysis

  • max time kernel
    151s
  • max time network
    202s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-06-2024 14:04

General

  • Target

    AppxSip/devenum.dll

  • Size

    108KB

  • MD5

    13dc564be50b850d4ba18d8b28ed7802

  • SHA1

    17e703b95bd1ba6beeacb498d4494494e14b7266

  • SHA256

    d4c23365d6c16ed6be52fe620742c1fde00d2cb14c3844c7e633b2a251c4c39d

  • SHA512

    145da4efdeb0e710e0116462f957d2083c7ad3ee47269fdd853145a1f37ec37b888ad2a585f5965b61525a8848488ae4903eca7550208cda664b5fab9084ced6

  • SSDEEP

    1536:W0s0VKB22Wola4XD1HKVxY+e1DxJjdAeWH3z4OmFeTNvM3mBG52hhvzrDQdRC3am:lOBDJKVuaeWHjtmITNSmBG5Ghvbh

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 43 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\AppxSip\devenum.dll
    1⤵
    • Modifies registry class
    PID:3764

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Replay Monitor

Loading Replay Monitor...

Downloads