Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10_x64 -
resource
win10 -
submitted
19-07-2020 19:50
Static task
static1
Behavioral task
behavioral1
Sample
zloader 2_1.0.9.0.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zloader 2_1.0.9.0.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
zloader 2_1.0.9.0.vir.exe
-
Size
151KB
-
MD5
bb7433758b61eb6483579bdae17392cf
-
SHA1
4a007e1c530cdd23f9ea800f0530f4da6a5d7080
-
SHA256
8d1cba212e338195e1edb8d4e4dde560fd9a36c0d177d6f5419e4e4e5e5c5b3d
-
SHA512
e769b53220e4680f751fdb6041b8bdaf8119870cb1b427664284ec7530eb1107956f6299a8bd1e84ca3f3c959acdf60a359715d72bb21615f069ee6e7f0d6e67
Score
8/10
Malware Config
Signatures
-
Blacklisted process makes network request 8 IoCs
Processes:
msiexec.exeflow pid process 28 3880 msiexec.exe 29 3880 msiexec.exe 30 3880 msiexec.exe 31 3880 msiexec.exe 32 3880 msiexec.exe 34 3880 msiexec.exe 36 3880 msiexec.exe 37 3880 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fafuduaf = "C:\\Users\\Admin\\AppData\\Roaming\\Cadou\\ycgohaoh.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zloader 2_1.0.9.0.vir.exedescription pid process target process PID 3888 set thread context of 3880 3888 zloader 2_1.0.9.0.vir.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 3880 msiexec.exe Token: SeSecurityPrivilege 3880 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
zloader 2_1.0.9.0.vir.exedescription pid process target process PID 3888 wrote to memory of 3880 3888 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 3888 wrote to memory of 3880 3888 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 3888 wrote to memory of 3880 3888 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 3888 wrote to memory of 3880 3888 zloader 2_1.0.9.0.vir.exe msiexec.exe PID 3888 wrote to memory of 3880 3888 zloader 2_1.0.9.0.vir.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\zloader 2_1.0.9.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zloader 2_1.0.9.0.vir.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blacklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken