Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 16:12

General

  • Target

    eb4943009e1976c9bf5bc6bf4ea44e4e.dll

  • Size

    326KB

  • MD5

    eb4943009e1976c9bf5bc6bf4ea44e4e

  • SHA1

    85f969317976d0b9848e3719168624eca778467c

  • SHA256

    8e538b14db8de2230c908e7e7d56112675762fa9edacfbc79e165e436df9a02e

  • SHA512

    fe20d1be1680f22c30753e23a710e53c3bdf246141146a29dcecddccdfea482deeac878777532a794193b3645654f51ebf6e22303281424352e624644c37a6ad

  • SSDEEP

    6144:qDzspNih30sJJSGTZN8xLOrbPzg0pIIAH1Gv8LTqcau1VA+6FlMx:qDzspNx4zN8xLO/PHAVOCVAlPA

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\eb4943009e1976c9bf5bc6bf4ea44e4e.dll,#1
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eb4943009e1976c9bf5bc6bf4ea44e4e.dll,#1
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2320
  • C:\Windows\system32\DllHost.exe
    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1668
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Adds Run key to start application
    • Modifies Internet Explorer Protected Mode
    • Modifies Internet Explorer Protected Mode Banner
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1212

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\OvzoZafqe\OvzoZafqe.dat

          Filesize

          88KB

          MD5

          3d6c5fe7d9893ac02aedf3d07bd4d72a

          SHA1

          9529ceed35ed69ca14b36f8cc1f508e95a9d3c88

          SHA256

          1dbeae9add746d44f8acf5a10a1f6ebd5e33a3c33c9d8c18ece4ab6f76aa52d8

          SHA512

          481b9f292abf2733bf4d6bce0f9b3758c92ad3696c8cb74bfc033e97fd3027da4ae5cad4ea7c1436a141d94387f321f4f4446987e554ca5b1dfba61e2e561732

        • \ProgramData\OvzoZafqe\OvzoZafqe.dat

          Filesize

          220KB

          MD5

          06a5574979bee48807c561b064535b58

          SHA1

          156e62d3172933aba72e34e60d4b1a3fc47d75a9

          SHA256

          2137bdd0482d1fd80ae3a82dc893e4e9171212cec6d5444074ea179bb4e24c8f

          SHA512

          3219a640c4dcd02d46c077ba0b0b796e6377b9960ff63705921e25ee7d96a5decc9beb26a53f570127107ccbfcee7781f93155e48be95979e480f3657b896d7e

        • memory/1212-26-0x0000000002DF0000-0x0000000002E43000-memory.dmp

          Filesize

          332KB

        • memory/1212-41-0x0000000002E60000-0x0000000002ECC000-memory.dmp

          Filesize

          432KB

        • memory/1212-24-0x0000000002E60000-0x0000000002ECC000-memory.dmp

          Filesize

          432KB

        • memory/1212-28-0x0000000002E60000-0x0000000002ECC000-memory.dmp

          Filesize

          432KB

        • memory/1212-19-0x0000000002DF0000-0x0000000002E43000-memory.dmp

          Filesize

          332KB

        • memory/1212-21-0x0000000002E60000-0x0000000002ECC000-memory.dmp

          Filesize

          432KB

        • memory/1212-22-0x0000000076D30000-0x0000000076D31000-memory.dmp

          Filesize

          4KB

        • memory/1668-33-0x0000000076D30000-0x0000000076D31000-memory.dmp

          Filesize

          4KB

        • memory/1668-30-0x00000000022B0000-0x000000000231C000-memory.dmp

          Filesize

          432KB

        • memory/2320-18-0x00000000001A0000-0x00000000001D3000-memory.dmp

          Filesize

          204KB

        • memory/2320-35-0x0000000076F10000-0x0000000076F11000-memory.dmp

          Filesize

          4KB

        • memory/2320-13-0x00000000001A0000-0x00000000001D1000-memory.dmp

          Filesize

          196KB

        • memory/2320-1-0x0000000010000000-0x0000000010040000-memory.dmp

          Filesize

          256KB

        • memory/2320-11-0x00000000001A0000-0x00000000001D3000-memory.dmp

          Filesize

          204KB

        • memory/2320-39-0x00000000001A0000-0x00000000001D1000-memory.dmp

          Filesize

          196KB

        • memory/2320-7-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2320-0-0x0000000010000000-0x0000000010051000-memory.dmp

          Filesize

          324KB

        • memory/2320-36-0x0000000000310000-0x0000000000363000-memory.dmp

          Filesize

          332KB

        • memory/2320-37-0x0000000002D30000-0x0000000002DAB000-memory.dmp

          Filesize

          492KB

        • memory/2320-38-0x0000000010000000-0x0000000010040000-memory.dmp

          Filesize

          256KB

        • memory/2868-34-0x0000000076D30000-0x0000000076ED9000-memory.dmp

          Filesize

          1.7MB

        • memory/2868-40-0x0000000076D30000-0x0000000076ED9000-memory.dmp

          Filesize

          1.7MB

        • memory/2868-32-0x0000000001EB0000-0x0000000001F1C000-memory.dmp

          Filesize

          432KB