Analysis
-
max time kernel
84s -
max time network
90s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-03-2021 01:09
Behavioral task
behavioral1
Sample
d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.dll
Resource
win10v20201028
General
-
Target
d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.dll
-
Size
192KB
-
MD5
973392c2fd7228262e52becf3bfe2051
-
SHA1
d309f4073f2a3244e71013996b8ea8e6fcc7b16f
-
SHA256
d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8
-
SHA512
58bbbbac404e2aa70c7c3dd65c3cf7356387a6632874b3e3ba896f0c18396dc3db1232d13fd2456e3ec4c138b4a2e90b45e2c6964d9b177415e2068f5d340ff7
Malware Config
Extracted
zloader
10/03
https://dhteijwrb.host/milagrecf.php
https://aquolepp.pw/milagrecf.php
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uhseegxe = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Fiecy\\ektiek.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1764 set thread context of 2260 1764 regsvr32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 2260 msiexec.exe Token: SeSecurityPrivilege 2260 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 508 wrote to memory of 1764 508 regsvr32.exe regsvr32.exe PID 508 wrote to memory of 1764 508 regsvr32.exe regsvr32.exe PID 508 wrote to memory of 1764 508 regsvr32.exe regsvr32.exe PID 1764 wrote to memory of 2260 1764 regsvr32.exe msiexec.exe PID 1764 wrote to memory of 2260 1764 regsvr32.exe msiexec.exe PID 1764 wrote to memory of 2260 1764 regsvr32.exe msiexec.exe PID 1764 wrote to memory of 2260 1764 regsvr32.exe msiexec.exe PID 1764 wrote to memory of 2260 1764 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d294955e1962a7342f6706facfbc735b8d84e94bf1de9ed0d7aa87bfc838f1f8.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2260