Analysis
-
max time kernel
74s -
max time network
61s -
platform
windows7_x64 -
resource
win7 -
submitted
10/07/2020, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
ungulate.dll
Resource
win7
Behavioral task
behavioral2
Sample
ungulate.dll
Resource
win10v200430
General
-
Target
ungulate.dll
-
Size
284KB
-
MD5
2881d2ca3bcf68dbbe2c3190a193dddc
-
SHA1
fc249ddc69222e5f62a6113211b20f5f21b5c2ab
-
SHA256
e38c9a5d62aec8a807336ef40668f82a9bf764a8102fe464ee7f82041e007bee
-
SHA512
9b79fd41012121a52f2762f24bf05489d6be18b1240899bd8abc43ae92a4f37160ccdb736cec3ca138fba6b315680b6ef9822ff998b090256fc6323fd9372743
Malware Config
Extracted
zloader
main
2020-07-06
https://giridly.com/web/data
https://pleclep.com/web/data
https://phanleb.com/web/data
https://zonculet.com/web/data
https://dweandro.com/web/data
https://sweleger.com/web/data
https://cromecho.com/web/data
https://wunchilm.com/web/data
https://odoncrol.com/web/data
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hiquaw = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Unyski\\atga.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1300 set thread context of 1696 1300 rundll32.exe 27 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1696 msiexec.exe Token: SeSecurityPrivilege 1696 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1300 1196 rundll32.exe 24 PID 1196 wrote to memory of 1300 1196 rundll32.exe 24 PID 1196 wrote to memory of 1300 1196 rundll32.exe 24 PID 1196 wrote to memory of 1300 1196 rundll32.exe 24 PID 1196 wrote to memory of 1300 1196 rundll32.exe 24 PID 1196 wrote to memory of 1300 1196 rundll32.exe 24 PID 1196 wrote to memory of 1300 1196 rundll32.exe 24 PID 1300 wrote to memory of 1696 1300 rundll32.exe 27 PID 1300 wrote to memory of 1696 1300 rundll32.exe 27 PID 1300 wrote to memory of 1696 1300 rundll32.exe 27 PID 1300 wrote to memory of 1696 1300 rundll32.exe 27 PID 1300 wrote to memory of 1696 1300 rundll32.exe 27 PID 1300 wrote to memory of 1696 1300 rundll32.exe 27 PID 1300 wrote to memory of 1696 1300 rundll32.exe 27 PID 1300 wrote to memory of 1696 1300 rundll32.exe 27 PID 1300 wrote to memory of 1696 1300 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ungulate.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ungulate.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-