Analysis
-
max time kernel
119s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:56
Static task
static1
Behavioral task
behavioral1
Sample
0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2.dll
Resource
win10v2004-en-20220112
General
-
Target
0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2.dll
-
Size
243KB
-
MD5
7b5549a7d9e638eb713dce14c2ad357b
-
SHA1
171c328013f121ea18c68436c5450b89c50e8794
-
SHA256
0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2
-
SHA512
b62f454bc52de5975b9327889cf52f2a7103936bd3437156ab85e31119ed42b8ea19bc78cefa07ded3a6b9c87407c6bf43bff25275b25bb5073bb07b079a0616
Malware Config
Extracted
zloader
DLLobnova
newupdate326
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
https://dsdjfhdsufudhjas.info/gate.php
https://fdsjfjdsfjdsdsjajjs.info/gate.php
https://idisaudhasdhasdj.info/gate.php
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
-
build_id
5
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 5 1596 msiexec.exe 7 1596 msiexec.exe 9 1596 msiexec.exe 11 1596 msiexec.exe 13 1596 msiexec.exe 15 1596 msiexec.exe 17 1596 msiexec.exe 19 1596 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Myecdiy = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Safu\\erizporo.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1096 set thread context of 1596 1096 rundll32.exe 28 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1596 msiexec.exe Token: SeSecurityPrivilege 1596 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 976 wrote to memory of 1096 976 rundll32.exe 27 PID 976 wrote to memory of 1096 976 rundll32.exe 27 PID 976 wrote to memory of 1096 976 rundll32.exe 27 PID 976 wrote to memory of 1096 976 rundll32.exe 27 PID 976 wrote to memory of 1096 976 rundll32.exe 27 PID 976 wrote to memory of 1096 976 rundll32.exe 27 PID 976 wrote to memory of 1096 976 rundll32.exe 27 PID 1096 wrote to memory of 1596 1096 rundll32.exe 28 PID 1096 wrote to memory of 1596 1096 rundll32.exe 28 PID 1096 wrote to memory of 1596 1096 rundll32.exe 28 PID 1096 wrote to memory of 1596 1096 rundll32.exe 28 PID 1096 wrote to memory of 1596 1096 rundll32.exe 28 PID 1096 wrote to memory of 1596 1096 rundll32.exe 28 PID 1096 wrote to memory of 1596 1096 rundll32.exe 28 PID 1096 wrote to memory of 1596 1096 rundll32.exe 28 PID 1096 wrote to memory of 1596 1096 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-