Analysis

  • max time kernel
    193s
  • max time network
    301s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-06-2024 22:29

General

  • Target

    Team Tools/Dynamic Code Coverage Tools/amd64/msdia110.dll

  • Size

    1.0MB

  • MD5

    24ac8872b2ce510e3b615e3a50059fdb

  • SHA1

    d06915c57a24b2bc6f806b3d9b944742b9f161af

  • SHA256

    1d5d4a3c0d149966835e3832ccf16bacdc0b4fa799e4cfab0c7852ead59e9d24

  • SHA512

    9b62c352eac4fb1317fd1d6390c99bf88a64700651b9c37d95482a41f02c36bc587ff14bdef8223a1b1f178539e7bffd928da60de7a6b982e3831cb17e7b93de

  • SSDEEP

    12288:agyupQeL8wx8XhiaMQUjEAdwATQessvmp5ukkgr5yeYcc5eFN1pxxVwHBNiERA:agyuGMzjEAdwAUpBkJeY15k1VwHBNiD

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 26 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\Team Tools\Dynamic Code Coverage Tools\amd64\msdia110.dll"
    1⤵
    • Modifies registry class
    PID:1836

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Replay Monitor

Loading Replay Monitor...

Downloads