Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 07:44
Static task
static1
Behavioral task
behavioral1
Sample
2cefb03b68c5489c2abdde9993aa85d8465a26ce9ddb78849ee5e198103fdf6a.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2cefb03b68c5489c2abdde9993aa85d8465a26ce9ddb78849ee5e198103fdf6a.dll
Resource
win10v2004-en-20220112
General
-
Target
2cefb03b68c5489c2abdde9993aa85d8465a26ce9ddb78849ee5e198103fdf6a.dll
-
Size
471KB
-
MD5
ff8c1a8415c476056ee409fc2e36f815
-
SHA1
fad5bd02642a99e165ff01eb88fc5d8250646e4e
-
SHA256
2cefb03b68c5489c2abdde9993aa85d8465a26ce9ddb78849ee5e198103fdf6a
-
SHA512
dc50aefe6ac43ac81bbc802d8c4194b9c3d444a7a536f850692b5a1e5cba99767cfa524772f8c7142fe2d394392b3eef003b3a32b0038383a1c22a51a7d93c5a
Malware Config
Extracted
zloader
main
25.03.2020
https://hustlertest.com/sound.php
https://dandycodes.com/sound.php
https://sandyfotos.com/sound.php
https://postgringos.com/sound.php
https://tetraslims.com/sound.php
https://greenrumba.com/sound.php
-
build_id
28
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ytirxuos = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Izci\\iqywo.dll,DllRegisterServer" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1520 set thread context of 916 1520 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 916 msiexec.exe Token: SeSecurityPrivilege 916 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 956 wrote to memory of 1520 956 rundll32.exe rundll32.exe PID 956 wrote to memory of 1520 956 rundll32.exe rundll32.exe PID 956 wrote to memory of 1520 956 rundll32.exe rundll32.exe PID 956 wrote to memory of 1520 956 rundll32.exe rundll32.exe PID 956 wrote to memory of 1520 956 rundll32.exe rundll32.exe PID 956 wrote to memory of 1520 956 rundll32.exe rundll32.exe PID 956 wrote to memory of 1520 956 rundll32.exe rundll32.exe PID 1520 wrote to memory of 916 1520 rundll32.exe msiexec.exe PID 1520 wrote to memory of 916 1520 rundll32.exe msiexec.exe PID 1520 wrote to memory of 916 1520 rundll32.exe msiexec.exe PID 1520 wrote to memory of 916 1520 rundll32.exe msiexec.exe PID 1520 wrote to memory of 916 1520 rundll32.exe msiexec.exe PID 1520 wrote to memory of 916 1520 rundll32.exe msiexec.exe PID 1520 wrote to memory of 916 1520 rundll32.exe msiexec.exe PID 1520 wrote to memory of 916 1520 rundll32.exe msiexec.exe PID 1520 wrote to memory of 916 1520 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cefb03b68c5489c2abdde9993aa85d8465a26ce9ddb78849ee5e198103fdf6a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cefb03b68c5489c2abdde9993aa85d8465a26ce9ddb78849ee5e198103fdf6a.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:916