Analysis
-
max time kernel
147s -
max time network
62s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10/07/2020, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
ungulate.dll
Resource
win7
Behavioral task
behavioral2
Sample
ungulate.dll
Resource
win10v200430
General
-
Target
ungulate.dll
-
Size
284KB
-
MD5
2881d2ca3bcf68dbbe2c3190a193dddc
-
SHA1
fc249ddc69222e5f62a6113211b20f5f21b5c2ab
-
SHA256
e38c9a5d62aec8a807336ef40668f82a9bf764a8102fe464ee7f82041e007bee
-
SHA512
9b79fd41012121a52f2762f24bf05489d6be18b1240899bd8abc43ae92a4f37160ccdb736cec3ca138fba6b315680b6ef9822ff998b090256fc6323fd9372743
Malware Config
Extracted
zloader
main
2020-07-06
https://giridly.com/web/data
https://pleclep.com/web/data
https://phanleb.com/web/data
https://zonculet.com/web/data
https://dweandro.com/web/data
https://sweleger.com/web/data
https://cromecho.com/web/data
https://wunchilm.com/web/data
https://odoncrol.com/web/data
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kyederk = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Sielx\\efun.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4064 set thread context of 2524 4064 rundll32.exe 73 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2524 msiexec.exe Token: SeSecurityPrivilege 2524 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3692 wrote to memory of 4064 3692 rundll32.exe 66 PID 3692 wrote to memory of 4064 3692 rundll32.exe 66 PID 3692 wrote to memory of 4064 3692 rundll32.exe 66 PID 4064 wrote to memory of 2524 4064 rundll32.exe 73 PID 4064 wrote to memory of 2524 4064 rundll32.exe 73 PID 4064 wrote to memory of 2524 4064 rundll32.exe 73 PID 4064 wrote to memory of 2524 4064 rundll32.exe 73 PID 4064 wrote to memory of 2524 4064 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ungulate.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ungulate.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-