Overview
overview
10Static
static
10zen.win-sp...al.dll
windows10-2004-x64
5zen.win-sp...org.js
windows7-x64
3zen.win-sp...org.js
windows10-2004-x64
3zen.win-sp...org.js
windows7-x64
3zen.win-sp...org.js
windows10-2004-x64
3zen.win-sp...efs.js
windows7-x64
3zen.win-sp...efs.js
windows10-2004-x64
3zen.win-sp...l3.dll
windows10-2004-x64
1zen.win-sp...cs.dll
windows10-2004-x64
1zen.win-sp...ey.dll
windows10-2004-x64
1zen.win-sp...ts.dll
windows10-2004-x64
1zen.win-sp...bs.dll
windows10-2004-x64
1zen.win-sp...GL.dll
windows10-2004-x64
1zen.win-sp...v2.dll
windows10-2004-x64
1zen.win-sp...ec.dll
windows10-2004-x64
1zen.win-sp...il.dll
windows10-2004-x64
1zen.win-sp...ue.dll
windows10-2004-x64
1zen.win-sp...40.dll
windows7-x64
1zen.win-sp...40.dll
windows10-2004-x64
1zen.win-sp...xy.exe
windows7-x64
1zen.win-sp...xy.exe
windows10-2004-x64
1zen.win-sp...er.dll
windows10-2004-x64
1zen.win-sp...s3.dll
windows10-2004-x64
1zen.win-sp...bi.dll
windows10-2004-x64
1zen.win-sp...ts.dll
windows10-2004-x64
1zen.win-sp...er.exe
windows10-2004-x64
3zen.win-sp...er.exe
windows10-2004-x64
1zen.win-sp...ng.exe
windows10-2004-x64
1zen.win-sp...n3.dll
windows10-2004-x64
1zen.win-sp...er.exe
windows7-x64
4zen.win-sp...er.exe
windows10-2004-x64
4$PLUGINSDIR/UAC.dll
windows7-x64
3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/09/2024, 19:02
Behavioral task
behavioral1
Sample
zen.win-specific\zen\AccessibleMarshal.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral2
Sample
zen.win-specific\zen\browser\features\[email protected]
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
zen.win-specific\zen\browser\features\[email protected]
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
zen.win-specific\zen\browser\features\[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
zen.win-specific\zen\browser\features\[email protected]
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
zen.win-specific\zen\defaults\pref\channel-prefs.js
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
zen.win-specific\zen\defaults\pref\channel-prefs.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
zen.win-specific\zen\freebl3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
zen.win-specific\zen\gkcodecs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
zen.win-specific\zen\gmp-clearkey\0.1\clearkey.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
zen.win-specific\zen\ipcclientcerts.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
zen.win-specific\zen\lgpllibs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
zen.win-specific\zen\libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
zen.win-specific\zen\libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
zen.win-specific\zen\mozavcodec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
zen.win-specific\zen\mozavutil.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
zen.win-specific\zen\mozglue.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
zen.win-specific\zen\msvcp140.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
zen.win-specific\zen\msvcp140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
zen.win-specific\zen\nmhproxy.exe
Resource
win7-20240708-en
Behavioral task
behavioral21
Sample
zen.win-specific\zen\nmhproxy.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
zen.win-specific\zen\notificationserver.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
zen.win-specific\zen\nss3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
zen.win-specific\zen\nssckbi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
zen.win-specific\zen\osclientcerts.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
zen.win-specific\zen\pingsender.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
zen.win-specific\zen\plugin-container.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
zen.win-specific\zen\private_browsing.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
zen.win-specific\zen\softokn3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
zen.win-specific\zen\uninstall\helper.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
zen.win-specific\zen\uninstall\helper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240708-en
General
-
Target
$PLUGINSDIR/UAC.dll
-
Size
28KB
-
MD5
d23b256e9c12fe37d984bae5017c5f8c
-
SHA1
fd698b58a563816b2260bbc50d7f864b33523121
-
SHA256
ec6a56d981892bf251df1439bea425a5f6c7e1c7312d44bedd5e2957f270338c
-
SHA512
13f284821324ffaeadafd3651f64d896186f47cf9a68735642cf37b37de777dba197067fbccd3a7411b5dc7976e510439253bd24c9be1d36c0a59d924c17ae8e
-
SSDEEP
384:2lqVibvTh4qnFP+OPEzinclP++vDGFtart8E9VFK4iBSaXrwz1k:EqVavVfPkzhlmIDGFo+EAzrn
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2636 2640 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2640 3020 rundll32.exe 30 PID 3020 wrote to memory of 2640 3020 rundll32.exe 30 PID 3020 wrote to memory of 2640 3020 rundll32.exe 30 PID 3020 wrote to memory of 2640 3020 rundll32.exe 30 PID 3020 wrote to memory of 2640 3020 rundll32.exe 30 PID 3020 wrote to memory of 2640 3020 rundll32.exe 30 PID 3020 wrote to memory of 2640 3020 rundll32.exe 30 PID 2640 wrote to memory of 2636 2640 rundll32.exe 31 PID 2640 wrote to memory of 2636 2640 rundll32.exe 31 PID 2640 wrote to memory of 2636 2640 rundll32.exe 31 PID 2640 wrote to memory of 2636 2640 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\UAC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\UAC.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 2243⤵
- Program crash
PID:2636
-
-