Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 06:21
Behavioral task
behavioral1
Sample
5a9ce6e613360c55e18d082a1279a83bf7a36e1825e4553f8a2672775e8e7b7e.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5a9ce6e613360c55e18d082a1279a83bf7a36e1825e4553f8a2672775e8e7b7e.dll
Resource
win10v2004-en-20220113
General
-
Target
5a9ce6e613360c55e18d082a1279a83bf7a36e1825e4553f8a2672775e8e7b7e.dll
-
Size
489KB
-
MD5
773ddf5b1f3c6aed86f5a6d5e47d6cf0
-
SHA1
6b78117fdebf7ecd999bed5c80c1eedad38d7307
-
SHA256
5a9ce6e613360c55e18d082a1279a83bf7a36e1825e4553f8a2672775e8e7b7e
-
SHA512
b93ffe3295f70b0e6983e2464809586bae36f46057728a1118f0e55ab5aa41e8e8bf598d32075ea6250136332fe3fce2ec62a183d1a549b811bfac44177d1d08
Malware Config
Extracted
zloader
NNN
NNN
http://marchadvertisingnetwork4.com/post.php
http://march262020.best/post.php
http://march262020.club/post.php
http://march262020.com/post.php
http://march262020.live/post.php
http://march262020.network/post.php
http://march262020.online/post.php
http://march262020.site/post.php
http://march262020.store/post.php
http://march262020.tech/post.php
-
build_id
79
Signatures
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Blocklisted process makes network request 13 IoCs
flow pid Process 7 1632 msiexec.exe 9 1632 msiexec.exe 11 1632 msiexec.exe 13 1632 msiexec.exe 15 1632 msiexec.exe 16 1632 msiexec.exe 17 1632 msiexec.exe 18 1632 msiexec.exe 19 1632 msiexec.exe 21 1632 msiexec.exe 23 1632 msiexec.exe 25 1632 msiexec.exe 27 1632 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Biga = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Miit\\zeuxes.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 1632 1624 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1632 msiexec.exe Token: SeSecurityPrivilege 1632 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1624 1652 rundll32.exe 27 PID 1652 wrote to memory of 1624 1652 rundll32.exe 27 PID 1652 wrote to memory of 1624 1652 rundll32.exe 27 PID 1652 wrote to memory of 1624 1652 rundll32.exe 27 PID 1652 wrote to memory of 1624 1652 rundll32.exe 27 PID 1652 wrote to memory of 1624 1652 rundll32.exe 27 PID 1652 wrote to memory of 1624 1652 rundll32.exe 27 PID 1624 wrote to memory of 1632 1624 rundll32.exe 30 PID 1624 wrote to memory of 1632 1624 rundll32.exe 30 PID 1624 wrote to memory of 1632 1624 rundll32.exe 30 PID 1624 wrote to memory of 1632 1624 rundll32.exe 30 PID 1624 wrote to memory of 1632 1624 rundll32.exe 30 PID 1624 wrote to memory of 1632 1624 rundll32.exe 30 PID 1624 wrote to memory of 1632 1624 rundll32.exe 30 PID 1624 wrote to memory of 1632 1624 rundll32.exe 30 PID 1624 wrote to memory of 1632 1624 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a9ce6e613360c55e18d082a1279a83bf7a36e1825e4553f8a2672775e8e7b7e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a9ce6e613360c55e18d082a1279a83bf7a36e1825e4553f8a2672775e8e7b7e.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-