Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 13:54
Behavioral task
behavioral1
Sample
DZKJ.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DZKJ.exe
Resource
win10v2004-20240226-en
General
-
Target
DZKJ.exe
-
Size
14.8MB
-
MD5
7d94503119588f1e769d1a871a949969
-
SHA1
d31a2fcb9fa635b7ca9cda8b6a239815a6645dcd
-
SHA256
dcb378e8645acb7a8c2be0f51f9c9c125044659a73390d524accb96772f79a16
-
SHA512
cc1b52450d9623d6766320cc80346fe6e8e00f669b2a3f7fd8ab95e5c610803d66457e886e62dff371421982dd21c259159eb5a0907c94562f018e816e3dd95f
-
SSDEEP
196608:WgA3UoPtKLBSIkMmf5XPmImn/2gpi08QukGZl9lEL38NlxgjewYk1jrMX+5j6txW:pAkolIBShMwu+2ukmoKlxgjewXmxB35m
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DZKJ.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DZKJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DZKJ.exe -
Loads dropped DLL 2 IoCs
pid Process 3920 regsvr32.exe 4396 DZKJ.exe -
resource yara_rule behavioral2/memory/4396-0-0x0000000000400000-0x0000000001906000-memory.dmp themida behavioral2/memory/4396-2-0x0000000000400000-0x0000000001906000-memory.dmp themida behavioral2/memory/4396-3-0x0000000000400000-0x0000000001906000-memory.dmp themida behavioral2/memory/4396-4-0x0000000000400000-0x0000000001906000-memory.dmp themida behavioral2/memory/4396-5-0x0000000000400000-0x0000000001906000-memory.dmp themida behavioral2/memory/4396-16-0x0000000000400000-0x0000000001906000-memory.dmp themida behavioral2/memory/4396-30-0x0000000000400000-0x0000000001906000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DZKJ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 DZKJ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4396 DZKJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5108 4396 WerFault.exe 88 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DZKJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString DZKJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor DZKJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\ProcessorNameString DZKJ.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DZKJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily DZKJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion DZKJ.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\ = "_DSmartPDFEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8FD3196F-914B-4BF9-907C-75BB8FB9C069}\ = "SmartPDF Property Page" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib\ = "{D519DF02-6454-416B-9B0C-8B8792ACBC2D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D}\1.0\HELPDIR\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\Control\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D}\1.0\FLAGS\ = "2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8FD3196F-914B-4BF9-907C-75BB8FB9C069} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\ = "SmartPDF Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8FD3196F-914B-4BF9-907C-75BB8FB9C069}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DZPdf.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MFCACTIVEXCONTRO.SmartPDFCtrl.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\MiscStatus\1\ = "131473" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D}\1.0\ = "SmartPDFLib" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\ProgID\ = "MFCACTIVEXCONTRO.SmartPDFCtrl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DZPdf.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DZPdf.dll, 5" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8FD3196F-914B-4BF9-907C-75BB8FB9C069}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\ = "_DSmartPDF" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DZPdf.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\ = "_DSmartPDF" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\ = "_DSmartPDFEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MFCACTIVEXCONTRO.SmartPDFCtrl.1\ = "SmartPDF Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\MiscStatus\1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib\ = "{D519DF02-6454-416B-9B0C-8B8792ACBC2D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib\ = "{D519DF02-6454-416B-9B0C-8B8792ACBC2D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MFCACTIVEXCONTRO.SmartPDFCtrl.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MFCACTIVEXCONTRO.SmartPDFCtrl.1\CLSID\ = "{6F22EEE9-8467-4806-81C1-FE62D6838E22}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F22EEE9-8467-4806-81C1-FE62D6838E22}\TypeLib\ = "{D519DF02-6454-416B-9B0C-8B8792ACBC2D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D519DF02-6454-416B-9B0C-8B8792ACBC2D}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EE23AE3-BE35-4D73-A46D-20B37AE78EF6}\TypeLib\ = "{D519DF02-6454-416B-9B0C-8B8792ACBC2D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17800119-D1EF-452A-A97C-1DBEDE9FB9E0}\TypeLib regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4396 DZKJ.exe 4396 DZKJ.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4396 DZKJ.exe 4396 DZKJ.exe 4396 DZKJ.exe 4396 DZKJ.exe 4396 DZKJ.exe 4396 DZKJ.exe 4396 DZKJ.exe 4396 DZKJ.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 3920 4396 DZKJ.exe 92 PID 4396 wrote to memory of 3920 4396 DZKJ.exe 92 PID 4396 wrote to memory of 3920 4396 DZKJ.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\DZKJ.exe"C:\Users\Admin\AppData\Local\Temp\DZKJ.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Users\Admin\AppData\Local\Temp\DZPdf.dll /s2⤵
- Loads dropped DLL
- Modifies registry class
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 24802⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4396 -ip 43961⤵PID:1584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD535d66db087de03b967ad8d62fa22dbb9
SHA1e9cd8518fa44253bb1e3582ef0323228932e3bb6
SHA256a42a1b5caf838b3d211c5e4c3aef41aa4b60d0a9394264810a0768f60c330e2c
SHA5123a793be20fe5f6fe8763af18bce1120c4bad63c8e6110120d92e18852d86490d58ee03dd11acc3f2f8eb15911fbbcb93edc6c7d244a4f0dafb45782591f64484