Analysis

  • max time kernel
    144s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2023 05:12

General

  • Target

    zmods_twitch.dll

  • Size

    1.2MB

  • MD5

    3b1a6a29073de849cb04b3d7b815ea73

  • SHA1

    d840caa9e8969c8a326073132a1d45079da15390

  • SHA256

    65cadd966b0d98d75900b115402b57475e76ca70c762050152866d7350fb8601

  • SHA512

    0df24c53f2bb72246acd090f55dae1ad71cfe3415f87d6f6ef935aba54a0f3d1ef0e0c755a4a0daf3a863bae5071aba87b11f6df057836c5f81135324d25a76e

  • SSDEEP

    12288:R7V8yqrCfPsloP2JaA88skvHclnu7iFLr3kuZmaFuk8fPlfTagS2ZjXhySKYih14:isW2Lr3kukr3Plfi4jXYbYBtSQI9

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 11 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\zmods_twitch.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\zmods_twitch.dll,#1
      2⤵
        PID:3584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 660
          3⤵
          • Program crash
          PID:716
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3584 -ip 3584
      1⤵
        PID:3564
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\CompressSuspend.jpeg" /ForceBootstrapPaint3D
        1⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:992
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
        1⤵
        • Drops file in System32 directory
        PID:5060
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2324

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5060-133-0x00000238B3C60000-0x00000238B3C70000-memory.dmp

        Filesize

        64KB

      • memory/5060-137-0x00000238B3CA0000-0x00000238B3CB0000-memory.dmp

        Filesize

        64KB

      • memory/5060-144-0x00000238BBF70000-0x00000238BBF71000-memory.dmp

        Filesize

        4KB

      • memory/5060-146-0x00000238BBFF0000-0x00000238BBFF1000-memory.dmp

        Filesize

        4KB

      • memory/5060-148-0x00000238BBFF0000-0x00000238BBFF1000-memory.dmp

        Filesize

        4KB

      • memory/5060-149-0x00000238BC080000-0x00000238BC081000-memory.dmp

        Filesize

        4KB

      • memory/5060-150-0x00000238BC080000-0x00000238BC081000-memory.dmp

        Filesize

        4KB

      • memory/5060-151-0x00000238BC090000-0x00000238BC091000-memory.dmp

        Filesize

        4KB

      • memory/5060-152-0x00000238BC090000-0x00000238BC091000-memory.dmp

        Filesize

        4KB