Resubmissions
12-10-2021 18:50
211012-xhew3adbd2 1027-09-2021 20:56
210927-zrbbcaabhl 1014-09-2021 15:35
210914-s1ddqsfhf8 10Analysis
-
max time kernel
1765s -
max time network
1767s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-09-2021 20:56
Static task
static1
Behavioral task
behavioral1
Sample
tim.dll
Resource
win7v20210408
General
-
Target
tim.dll
-
Size
429KB
-
MD5
75784d297b3d6fb4d434b6890f6334ab
-
SHA1
dc945e57be6bdd3cc4894d6cff7dd90a76f6c416
-
SHA256
95a8370c36d81ea596d83892115ce6b90717396c8f657b17696c7eeb2dba1d2e
-
SHA512
f54baffc5b545aaa4d939505181466d7b78bb583fd32da6cbf8cea058fca8869e8bf7bf3272f43d09a7b24dc6e821c9aa0e3875dd2959173e704d57568915fa1
Malware Config
Extracted
zloader
tim
tim
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
-
suricata: ET MALWARE Observed ZLoader CnC Domain in SNI
suricata: ET MALWARE Observed ZLoader CnC Domain in SNI
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Blocklisted process makes network request 23 IoCs
flow pid Process 14 1996 msiexec.exe 16 1996 msiexec.exe 25 1996 msiexec.exe 32 1996 msiexec.exe 34 1996 msiexec.exe 38 1996 msiexec.exe 44 1996 msiexec.exe 46 1996 msiexec.exe 49 1996 msiexec.exe 54 1996 msiexec.exe 56 1996 msiexec.exe 58 1996 msiexec.exe 59 1996 msiexec.exe 60 1996 msiexec.exe 61 1996 msiexec.exe 62 1996 msiexec.exe 63 1996 msiexec.exe 66 1996 msiexec.exe 67 1996 msiexec.exe 69 1996 msiexec.exe 70 1996 msiexec.exe 71 1996 msiexec.exe 72 1996 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wyyzy = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Vaed\\rawug.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1104 set thread context of 1996 1104 regsvr32.exe 28 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1996 msiexec.exe Token: SeSecurityPrivilege 1996 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1104 1628 regsvr32.exe 25 PID 1628 wrote to memory of 1104 1628 regsvr32.exe 25 PID 1628 wrote to memory of 1104 1628 regsvr32.exe 25 PID 1628 wrote to memory of 1104 1628 regsvr32.exe 25 PID 1628 wrote to memory of 1104 1628 regsvr32.exe 25 PID 1628 wrote to memory of 1104 1628 regsvr32.exe 25 PID 1628 wrote to memory of 1104 1628 regsvr32.exe 25 PID 1104 wrote to memory of 1996 1104 regsvr32.exe 28 PID 1104 wrote to memory of 1996 1104 regsvr32.exe 28 PID 1104 wrote to memory of 1996 1104 regsvr32.exe 28 PID 1104 wrote to memory of 1996 1104 regsvr32.exe 28 PID 1104 wrote to memory of 1996 1104 regsvr32.exe 28 PID 1104 wrote to memory of 1996 1104 regsvr32.exe 28 PID 1104 wrote to memory of 1996 1104 regsvr32.exe 28 PID 1104 wrote to memory of 1996 1104 regsvr32.exe 28 PID 1104 wrote to memory of 1996 1104 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\tim.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\tim.dll2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-