Analysis
-
max time kernel
159s -
max time network
173s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 09:26
Static task
static1
Behavioral task
behavioral1
Sample
b3cb381f114ec9c163335509a217bbe1c6baa8d2cf5655b5ff84fd8d0a28dc9a.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b3cb381f114ec9c163335509a217bbe1c6baa8d2cf5655b5ff84fd8d0a28dc9a.dll
Resource
win10v2004-en-20220113
General
-
Target
b3cb381f114ec9c163335509a217bbe1c6baa8d2cf5655b5ff84fd8d0a28dc9a.dll
-
Size
257KB
-
MD5
5932c1d8e10c2032f9d05da06d1ae299
-
SHA1
aef4c1c9496c034e17d5917f9754e61a4ba01306
-
SHA256
b3cb381f114ec9c163335509a217bbe1c6baa8d2cf5655b5ff84fd8d0a28dc9a
-
SHA512
55eecb201ff082a5ae1a644649931123e725a7621dd607da1a827d2309c4256adf735b5b42a64f4d078843e7d414aacfe8f3a61f478584afac1f1a222282cd68
Malware Config
Extracted
zloader
DLLobnova
mrlapis
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
https://dsdjfhdsufudhjas.name/gate.php
https://dsdjfhd9ddksaas.com/gate.php
https://dsdjfhdsufudhjas.pw/gate.php
https://dsdjfhd9ddksaas.ru/gate.php
https://dsdjfhdsufudhjas.su/gate.php
https://kdsadisadijdsasm2.com/gate.php
https://dsdjfhdsufudhjas.net/gate.php
https://dsdjfhd9ddksaas.eu/gate.php
-
build_id
8
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yhocmi = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Moxua\\oxxaqod.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 572 1520 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 572 msiexec.exe Token: SeSecurityPrivilege 572 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1560 wrote to memory of 1520 1560 rundll32.exe 27 PID 1560 wrote to memory of 1520 1560 rundll32.exe 27 PID 1560 wrote to memory of 1520 1560 rundll32.exe 27 PID 1560 wrote to memory of 1520 1560 rundll32.exe 27 PID 1560 wrote to memory of 1520 1560 rundll32.exe 27 PID 1560 wrote to memory of 1520 1560 rundll32.exe 27 PID 1560 wrote to memory of 1520 1560 rundll32.exe 27 PID 1520 wrote to memory of 572 1520 rundll32.exe 30 PID 1520 wrote to memory of 572 1520 rundll32.exe 30 PID 1520 wrote to memory of 572 1520 rundll32.exe 30 PID 1520 wrote to memory of 572 1520 rundll32.exe 30 PID 1520 wrote to memory of 572 1520 rundll32.exe 30 PID 1520 wrote to memory of 572 1520 rundll32.exe 30 PID 1520 wrote to memory of 572 1520 rundll32.exe 30 PID 1520 wrote to memory of 572 1520 rundll32.exe 30 PID 1520 wrote to memory of 572 1520 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3cb381f114ec9c163335509a217bbe1c6baa8d2cf5655b5ff84fd8d0a28dc9a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3cb381f114ec9c163335509a217bbe1c6baa8d2cf5655b5ff84fd8d0a28dc9a.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-