Analysis

  • max time kernel
    117s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 04:44

General

  • Target

    05db5873ac698ff744b9378fc176fed2.dll

  • Size

    231KB

  • MD5

    05db5873ac698ff744b9378fc176fed2

  • SHA1

    bd405be67ce5006d4dffa957d90f0303c65cc795

  • SHA256

    dcdcbee43842a2b872e14131b9e99ae69faa3853cdee24ffbf62d0a6fc4eaef7

  • SHA512

    c872016fc1e36ddddacf53f1a2a59e75aa2b4c99e20f09965f58379e07d5732023f552727a1973167a789def0ad283fc537f46958b7cc74340fdced114a73174

  • SSDEEP

    3072:zysX0WxnWd/IkmL+PViEbmzwtz/wk8YWbH:mskd/IkmuVfyWdMH

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\05db5873ac698ff744b9378fc176fed2.dll,#1
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2848
  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\05db5873ac698ff744b9378fc176fed2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\ztrybuj.dll

          Filesize

          11KB

          MD5

          8083be9b07eba78e1c70ec9fcea1b0a7

          SHA1

          dafe9e7a2b66f8b131cac20d17f6794db56acf87

          SHA256

          6a8665ec9d9bb6700a50c6fd32e333965a5800c7aa61ba841ccf9457b6fb3404

          SHA512

          202284754360b2c8c1c56ca706f118c9e5d492d2586f8948e96936a8b4d2f70f68d6ab237fa687aeb860ffa768462b902f1bee9b8ba6c20e98fba701f46b3434

        • memory/2848-0-0x00000000001E0000-0x0000000000223000-memory.dmp

          Filesize

          268KB

        • memory/2848-2-0x00000000001E0000-0x0000000000223000-memory.dmp

          Filesize

          268KB

        • memory/2848-9-0x00000000768F0000-0x0000000076990000-memory.dmp

          Filesize

          640KB

        • memory/2848-11-0x00000000768F0000-0x0000000076990000-memory.dmp

          Filesize

          640KB

        • memory/2848-10-0x00000000001E0000-0x0000000000223000-memory.dmp

          Filesize

          268KB