Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 09:39
Static task
static1
Behavioral task
behavioral1
Sample
99fe4effb3bd5d31a6c9b740f693460042e9b327b6e6d78aaa04d40762784c8f.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
99fe4effb3bd5d31a6c9b740f693460042e9b327b6e6d78aaa04d40762784c8f.dll
Resource
win10v2004-en-20220113
General
-
Target
99fe4effb3bd5d31a6c9b740f693460042e9b327b6e6d78aaa04d40762784c8f.dll
-
Size
311KB
-
MD5
740dfab684548a0de118932556322457
-
SHA1
3c2f4e6d4bac71bf3541d99f279f535a3f479fb1
-
SHA256
99fe4effb3bd5d31a6c9b740f693460042e9b327b6e6d78aaa04d40762784c8f
-
SHA512
4e254f45b4b4881ca59cde612388f4a62a9f1512352f6710d4abb3cc9e212cde5d31b4a9273b8cfdd7bbedb69979c478eae5a4b6232f2af8a167b74fa487b856
Malware Config
Extracted
zloader
DLLobnova
alisa
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
https://dsdjfhdsufudhjas.name/gate.php
https://dsdjfhd9ddksaas.com/gate.php
https://dsdjfhdsufudhjas.pw/gate.php
https://dsdjfhd9ddksaas.ru/gate.php
https://dsdjfhdsufudhjas.su/gate.php
https://kdsadisadijdsasm2.com/gate.php
https://dsdjfhdsufudhjas.net/gate.php
https://dsdjfhd9ddksaas.eu/gate.php
-
build_id
5
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Akpio = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Tytur\\haniipi.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1600 set thread context of 560 1600 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 560 msiexec.exe Token: SeSecurityPrivilege 560 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1600 1360 rundll32.exe 27 PID 1360 wrote to memory of 1600 1360 rundll32.exe 27 PID 1360 wrote to memory of 1600 1360 rundll32.exe 27 PID 1360 wrote to memory of 1600 1360 rundll32.exe 27 PID 1360 wrote to memory of 1600 1360 rundll32.exe 27 PID 1360 wrote to memory of 1600 1360 rundll32.exe 27 PID 1360 wrote to memory of 1600 1360 rundll32.exe 27 PID 1600 wrote to memory of 560 1600 rundll32.exe 30 PID 1600 wrote to memory of 560 1600 rundll32.exe 30 PID 1600 wrote to memory of 560 1600 rundll32.exe 30 PID 1600 wrote to memory of 560 1600 rundll32.exe 30 PID 1600 wrote to memory of 560 1600 rundll32.exe 30 PID 1600 wrote to memory of 560 1600 rundll32.exe 30 PID 1600 wrote to memory of 560 1600 rundll32.exe 30 PID 1600 wrote to memory of 560 1600 rundll32.exe 30 PID 1600 wrote to memory of 560 1600 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99fe4effb3bd5d31a6c9b740f693460042e9b327b6e6d78aaa04d40762784c8f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99fe4effb3bd5d31a6c9b740f693460042e9b327b6e6d78aaa04d40762784c8f.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-