Analysis
-
max time kernel
153s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 09:14
Static task
static1
Behavioral task
behavioral1
Sample
ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll
Resource
win10v2004-en-20220113
General
-
Target
ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll
-
Size
281KB
-
MD5
f3362eae787c09d8061194591dee0727
-
SHA1
cc5fe51c5b35dcef50b5adfc730b1354ae124bab
-
SHA256
ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db
-
SHA512
e0ba969db9b0c217c25246695186b53734a4e502765f73d018f91480cc2120fe2472c3a9931bbee998660afd558c54a79b81a80ab32ae59115107084ab7d0de0
Malware Config
Extracted
zloader
DLLobnova
prodomains
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
https://dsdjfhdsufudhjas.name/gate.php
https://dsdjfhd9ddksaas.com/gate.php
https://dsdjfhdsufudhjas.pw/gate.php
https://dsdjfhd9ddksaas.ru/gate.php
https://dsdjfhdsufudhjas.su/gate.php
https://kdsadisadijdsasm2.com/gate.php
https://dsdjfhdsufudhjas.net/gate.php
https://dsdjfhd9ddksaas.eu/gate.php
-
build_id
27
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ovapelim = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Syec\\fauxeb.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1368 set thread context of 1820 1368 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1820 msiexec.exe Token: SeSecurityPrivilege 1820 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1680 wrote to memory of 1368 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1368 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1368 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1368 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1368 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1368 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1368 1680 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1820 1368 rundll32.exe msiexec.exe PID 1368 wrote to memory of 1820 1368 rundll32.exe msiexec.exe PID 1368 wrote to memory of 1820 1368 rundll32.exe msiexec.exe PID 1368 wrote to memory of 1820 1368 rundll32.exe msiexec.exe PID 1368 wrote to memory of 1820 1368 rundll32.exe msiexec.exe PID 1368 wrote to memory of 1820 1368 rundll32.exe msiexec.exe PID 1368 wrote to memory of 1820 1368 rundll32.exe msiexec.exe PID 1368 wrote to memory of 1820 1368 rundll32.exe msiexec.exe PID 1368 wrote to memory of 1820 1368 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca4214e15181e52923f713771455f5709e4baa13626cad85b735734cf66d36db.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1820