Analysis

  • max time kernel
    1778s
  • max time network
    1787s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-06-2024 11:21

General

  • Target

    ExplorerBlurMica/Release/register.cmd

  • Size

    247B

  • MD5

    e513f1f7f4eb1851973b281b0595f117

  • SHA1

    381e79bc136b3297cef997cc4df34538a1688b20

  • SHA256

    41f3089fb799635a8aa0ed059d491ca78f143f0f111a9b52a00c168eca9507ac

  • SHA512

    6d5d11592d871c52de76a30a9470b3933cd4e4531a7b77c73758fbe9269ac4635926d78d9f5178e26f5e25c4a0318e6cf0145a8c06affafcd626720a88abc27a

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ExplorerBlurMica\Release\register.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\system32\fsutil.exe
      fsutil dirty query C:
      2⤵
        PID:4652
      • C:\Windows\system32\regsvr32.exe
        regsvr32 "C:\Users\Admin\AppData\Local\Temp\ExplorerBlurMica\Release\ExplorerBlurMica.dll"
        2⤵
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        PID:1604

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Event Triggered Execution

    1
    T1546

    Component Object Model Hijacking

    1
    T1546.015

    Browser Extensions

    1
    T1176

    Privilege Escalation

    Event Triggered Execution

    1
    T1546

    Component Object Model Hijacking

    1
    T1546.015

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads