Overview
overview
6Static
static
3MKZ_Injektor.exe
windows7-x64
6MKZ_Injektor.exe
windows10-2004-x64
6Minimize_MKZSCC.dll
windows7-x64
3Minimize_MKZSCC.dll
windows10-2004-x64
3WallShot_MKZSCC.dll
windows7-x64
3WallShot_MKZSCC.dll
windows10-2004-x64
3glxpbuttonz.dll
windows7-x64
3glxpbuttonz.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
MKZ_Injektor.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
MKZ_Injektor.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Minimize_MKZSCC.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Minimize_MKZSCC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
WallShot_MKZSCC.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
WallShot_MKZSCC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
glxpbuttonz.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
glxpbuttonz.dll
Resource
win10v2004-20241007-en
General
-
Target
Minimize_MKZSCC.dll
-
Size
24KB
-
MD5
f2208de9008e76ba4114e899db911473
-
SHA1
8d7fe169addf82adae641f19c88901222d47f8ba
-
SHA256
8fa6da375307a8a981180840162d7751aea89b2046e77a3c1cc8a7bda8f25087
-
SHA512
031c884f5678472fbae1e7f3727e7b107454368f6022510c9acd5cec1ef9a59544d2a97c79928465fe23c062dddf90bf12140f3e3b2f005edd8597a9cc5df533
-
SSDEEP
384:3jCuiZYZubPxQVnbJ/nQB2nr4L/V+QXahs6XAaZp8D3wB:3nreuj/QBur4LdaXAG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2280 4416 rundll32.exe 83 PID 4416 wrote to memory of 2280 4416 rundll32.exe 83 PID 4416 wrote to memory of 2280 4416 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Minimize_MKZSCC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Minimize_MKZSCC.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2280
-