Analysis
-
max time kernel
261s -
max time network
263s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-11-2020 07:00
Static task
static1
General
-
Target
bd91abd60357f47d4a163df3fc27b795.exe
-
Size
291KB
-
MD5
bd91abd60357f47d4a163df3fc27b795
-
SHA1
7e572733b2ef7266dfdb237c32d73919df6ae298
-
SHA256
a50844184119e66e5d3a663be6d2d57d72a6748b6ce2d11974c688c8bc40d710
-
SHA512
4ad41d25cd85d16e5bc932ee68dcb79ed4845e679e7b14f23a32f7a57fc5aa783e0cd2eb7f5b58e7c8918e81f316bcffb7c658efc1d25223576b5383df39e604
Malware Config
Extracted
zloader
r1
r1
https://notsweets.net/LKhwojehDgwegSDG/gateJKjdsh.php
https://olpons.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://karamelliar.org/LKhwojehDgwegSDG/gateJKjdsh.php
https://dogrunn.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://azoraz.net/LKhwojehDgwegSDG/gateJKjdsh.php
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
bd91abd60357f47d4a163df3fc27b795.exedescription pid process target process PID 1644 created 1272 1644 bd91abd60357f47d4a163df3fc27b795.exe Explorer.EXE -
Blacklisted process makes network request 3 IoCs
Processes:
msiexec.exeflow pid process 6 1672 msiexec.exe 8 1672 msiexec.exe 9 1672 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bd91abd60357f47d4a163df3fc27b795.exedescription pid process target process PID 1644 set thread context of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
bd91abd60357f47d4a163df3fc27b795.exepid process 1644 bd91abd60357f47d4a163df3fc27b795.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bd91abd60357f47d4a163df3fc27b795.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1644 bd91abd60357f47d4a163df3fc27b795.exe Token: SeSecurityPrivilege 1672 msiexec.exe Token: SeSecurityPrivilege 1672 msiexec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bd91abd60357f47d4a163df3fc27b795.exedescription pid process target process PID 1644 wrote to memory of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe PID 1644 wrote to memory of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe PID 1644 wrote to memory of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe PID 1644 wrote to memory of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe PID 1644 wrote to memory of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe PID 1644 wrote to memory of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe PID 1644 wrote to memory of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe PID 1644 wrote to memory of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe PID 1644 wrote to memory of 1672 1644 bd91abd60357f47d4a163df3fc27b795.exe msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\bd91abd60357f47d4a163df3fc27b795.exe"C:\Users\Admin\AppData\Local\Temp\bd91abd60357f47d4a163df3fc27b795.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blacklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\UzuzMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1084-10-0x000007FEF7B10000-0x000007FEF7D8A000-memory.dmpFilesize
2.5MB
-
memory/1644-0-0x0000000002479000-0x000000000247A000-memory.dmpFilesize
4KB
-
memory/1644-1-0x0000000003C70000-0x0000000003C81000-memory.dmpFilesize
68KB
-
memory/1644-2-0x0000000003C70000-0x0000000003C81000-memory.dmpFilesize
68KB
-
memory/1672-5-0x0000000000090000-0x00000000000B8000-memory.dmpFilesize
160KB
-
memory/1672-6-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/1672-7-0x0000000000090000-0x00000000000B8000-memory.dmpFilesize
160KB
-
memory/1672-8-0x0000000000000000-mapping.dmp