Resubmissions

23-06-2024 14:14

240623-rj8ymsxdnn 10

17-06-2024 16:58

240617-vg68tazhkm 10

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-06-2024 14:14

General

  • Target

    __x64___setup___x32__/AppxSip/devenum.dll

  • Size

    108KB

  • MD5

    13dc564be50b850d4ba18d8b28ed7802

  • SHA1

    17e703b95bd1ba6beeacb498d4494494e14b7266

  • SHA256

    d4c23365d6c16ed6be52fe620742c1fde00d2cb14c3844c7e633b2a251c4c39d

  • SHA512

    145da4efdeb0e710e0116462f957d2083c7ad3ee47269fdd853145a1f37ec37b888ad2a585f5965b61525a8848488ae4903eca7550208cda664b5fab9084ced6

  • SSDEEP

    1536:W0s0VKB22Wola4XD1HKVxY+e1DxJjdAeWH3z4OmFeTNvM3mBG52hhvzrDQdRC3am:lOBDJKVuaeWHjtmITNSmBG5Ghvbh

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 43 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\__x64___setup___x32__\AppxSip\devenum.dll
    1⤵
    • Modifies registry class
    PID:3200

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Replay Monitor

Loading Replay Monitor...

Downloads