Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 03:48

General

  • Target

    $TEMP/Assist_hanzify.exe

  • Size

    193KB

  • MD5

    7e32fa5420daf2bef4833396f4390ab4

  • SHA1

    22238aa3e8ad066c525afc62e140937bfd597ca8

  • SHA256

    7a9be0f039c30ed7b521619244d5f1b34029f573162b39022948ab472bb65a04

  • SHA512

    3b5307f03cd6f74c11440aa36f0222c21850af7f4723e73b261b727b5c03c94fe2fa02e897e8a07c13c4bc0b53819a3b3ca6be0c668328fe0de0de5a9ff56ea1

  • SSDEEP

    3072:ck5+bFdkJCaWvV9MDKsxt+Q2ua4m3r8HlimB4PKPRngJY/HkzanhV2HD:x05aoV92xt12N33r8BOU+J6kzanhsHD

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 40 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\Assist_hanzify.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\Assist_hanzify.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\PROGRA~2\3721\helper.dll,Rundll32
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\3721\helper.dll

    Filesize

    44KB

    MD5

    49ae58008fc003af6f952a82c33aa3dd

    SHA1

    330630c95b6be9b61398d5952be9ee1f45799606

    SHA256

    8036ad2d2f302fafdef719836277834dd4f39289c326439543a86ac899384873

    SHA512

    bc9f20a02903452ecfa63fe290bfa550b10ce548247bb2452c3eb23bbca48d82144ab2fad22e4da7349465a3e0be5230b9cc0e2028a3318d7ea2990bca7ae8c3

  • \Program Files (x86)\3721\Assist\asbar.dll

    Filesize

    156KB

    MD5

    aaf5a6b61ca11868c31011a68d95a5ef

    SHA1

    d58bb83332af9e56758ff5cb1fcd3173567e6c4c

    SHA256

    a8cd1c0f58135ad104b0d2a3064d3d4b9792be5ff40a721aac7eb37e26708b36

    SHA512

    e6461950958a38089197932f6ba34b578a6d6932e1cf7412a2c93f5841e853468037c0cd2081d3ef5f744ab04df7b8b967113aa255066a1f22ae980dc6ceca3b

  • \Program Files (x86)\3721\Assist\assist.dll

    Filesize

    49KB

    MD5

    a3cbf83f654e5cc90422f4cc7a44f339

    SHA1

    58d03194e3e7691e30294a19ba798005fe9eba0b

    SHA256

    985815be546603778889135b8057ca9e43494993b21d880e7ad164659fff8060

    SHA512

    5f56d5dd8f4443ebaea493ae56f940fa68c1b384f045c8d01f64c92440cbcc10fc83f6a3cab924d258a90345c51bd5d1c481338a627b521a1384a570e2958d76

  • \Program Files (x86)\3721\AutoLive.dll

    Filesize

    128KB

    MD5

    7ff63507a1ea33dc677c1f0a838fadf6

    SHA1

    c35183495c7d90f22ad83970b4a86ca0c4b8b433

    SHA256

    68dbf3a7828473663ca275c6eef36d91ae0e620baa7c1583d0bbc4f780dbe5c3

    SHA512

    cdb8901c61e92894cf471fc305b0087f4849a71b8cb9f04eb6ddc6b53f90825532ceaaf57f6e5f98ff1f5a18ba20a0ecb6583a12e8777b5145704058582eb27d

  • \Users\Admin\AppData\Local\Temp\nsdA823.tmp\System.dll

    Filesize

    10KB

    MD5

    b21538d9f049d3e3e8b666744d7ca36d

    SHA1

    b97fc58f9aa238758a7574a2e32dac4e97392f47

    SHA256

    9dbe958fd425903ffc2197a112bec4fa597284f9637fe8fd5685016f32e21334

    SHA512

    05d2c660a43519fd35daa3b4310419b33e61ce8557bde55942315ca59c3b9cb9fdeaea42c403ad78a54fa9923eaa712bcf5a10dea83619a18c4ef0c451e6d533

  • \Users\Admin\AppData\Local\Temp\nsdA823.tmp\wmpns.dll

    Filesize

    44KB

    MD5

    67a76be36af407f74a340515312da5f8

    SHA1

    e1bf0b505629ccbbf2e0ec86b30e31ac1f7f835d

    SHA256

    eff43f4fd70798e1ad53302b38f14c8f905eacb404a650f82f61f7a222863571

    SHA512

    35b6821dc440ed8254a1a84c7ed002013d71321327a09e4e2144801651cb47c288fe9eef100fb09ccd43dfa5c562b6a8c3013059f0d46ff9d921585c217c17ac