Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:05
Static task
static1
Behavioral task
behavioral1
Sample
7556a3160ba28ac50418bb9989de2f83a5dfc54376a43500d16db7c3c76c04d4.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7556a3160ba28ac50418bb9989de2f83a5dfc54376a43500d16db7c3c76c04d4.dll
Resource
win10v2004-en-20220112
General
-
Target
7556a3160ba28ac50418bb9989de2f83a5dfc54376a43500d16db7c3c76c04d4.dll
-
Size
274KB
-
MD5
93b92d3e5ac8fa4c1e57dace11d95b6e
-
SHA1
5f4141f7ea51c279c4eff39dddc59c182bdf400a
-
SHA256
7556a3160ba28ac50418bb9989de2f83a5dfc54376a43500d16db7c3c76c04d4
-
SHA512
b4279f10458e87c21d155aff3f41cb4809043e7d20cebc10f178fd47649a23318c46dbda7136fc6ea5ea15dd7dc7cb3a627312cbb827a7b9b2ddda7b5b019bc6
Malware Config
Extracted
zloader
DLLobnova
ogneniyupdate
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
https://dsdjfhdsufudhjas.info/gate.php
https://fdsjfjdsfjdsdsjajjs.info/gate.php
https://idisaudhasdhasdj.info/gate.php
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
-
build_id
17
Signatures
-
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Blocklisted process makes network request 8 IoCs
flow pid Process 5 788 msiexec.exe 7 788 msiexec.exe 9 788 msiexec.exe 11 788 msiexec.exe 13 788 msiexec.exe 15 788 msiexec.exe 17 788 msiexec.exe 19 788 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Reevisu = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Ugyn\\hemek.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1268 set thread context of 788 1268 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 788 msiexec.exe Token: SeSecurityPrivilege 788 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1268 1616 rundll32.exe 27 PID 1616 wrote to memory of 1268 1616 rundll32.exe 27 PID 1616 wrote to memory of 1268 1616 rundll32.exe 27 PID 1616 wrote to memory of 1268 1616 rundll32.exe 27 PID 1616 wrote to memory of 1268 1616 rundll32.exe 27 PID 1616 wrote to memory of 1268 1616 rundll32.exe 27 PID 1616 wrote to memory of 1268 1616 rundll32.exe 27 PID 1268 wrote to memory of 788 1268 rundll32.exe 30 PID 1268 wrote to memory of 788 1268 rundll32.exe 30 PID 1268 wrote to memory of 788 1268 rundll32.exe 30 PID 1268 wrote to memory of 788 1268 rundll32.exe 30 PID 1268 wrote to memory of 788 1268 rundll32.exe 30 PID 1268 wrote to memory of 788 1268 rundll32.exe 30 PID 1268 wrote to memory of 788 1268 rundll32.exe 30 PID 1268 wrote to memory of 788 1268 rundll32.exe 30 PID 1268 wrote to memory of 788 1268 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7556a3160ba28ac50418bb9989de2f83a5dfc54376a43500d16db7c3c76c04d4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7556a3160ba28ac50418bb9989de2f83a5dfc54376a43500d16db7c3c76c04d4.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-