Analysis
-
max time kernel
126s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:58
Static task
static1
Behavioral task
behavioral1
Sample
0a6df8d51b26c7bd3a7376f6118049f1c37a91ee0b2f1ada2b86c561d1170e1b.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0a6df8d51b26c7bd3a7376f6118049f1c37a91ee0b2f1ada2b86c561d1170e1b.dll
Resource
win10v2004-en-20220112
General
-
Target
0a6df8d51b26c7bd3a7376f6118049f1c37a91ee0b2f1ada2b86c561d1170e1b.dll
-
Size
258KB
-
MD5
49584f3cfff1654ca65de4dcab99f4eb
-
SHA1
cf10674919968daff5fa1c589df97ce5a9e120a3
-
SHA256
0a6df8d51b26c7bd3a7376f6118049f1c37a91ee0b2f1ada2b86c561d1170e1b
-
SHA512
4d3443b89a7b054121b4f4ae1179a011fb946ce585471b499fd67029d536f904ddd3bce87ccb5823b9b6f790ce6d8152314da38d40248cf3f0ebe2876733222d
Malware Config
Extracted
zloader
DLLobnova
newupdate326
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
https://dsdjfhdsufudhjas.info/gate.php
https://fdsjfjdsfjdsdsjajjs.info/gate.php
https://idisaudhasdhasdj.info/gate.php
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
-
build_id
77
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 5 1492 msiexec.exe 7 1492 msiexec.exe 9 1492 msiexec.exe 11 1492 msiexec.exe 13 1492 msiexec.exe 15 1492 msiexec.exe 17 1492 msiexec.exe 19 1492 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ereqpyc = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Ywetfy\\idfu.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 1492 1344 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1492 msiexec.exe Token: SeSecurityPrivilege 1492 msiexec.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1344 1612 rundll32.exe 27 PID 1612 wrote to memory of 1344 1612 rundll32.exe 27 PID 1612 wrote to memory of 1344 1612 rundll32.exe 27 PID 1612 wrote to memory of 1344 1612 rundll32.exe 27 PID 1612 wrote to memory of 1344 1612 rundll32.exe 27 PID 1612 wrote to memory of 1344 1612 rundll32.exe 27 PID 1612 wrote to memory of 1344 1612 rundll32.exe 27 PID 1344 wrote to memory of 1492 1344 rundll32.exe 30 PID 1344 wrote to memory of 1492 1344 rundll32.exe 30 PID 1344 wrote to memory of 1492 1344 rundll32.exe 30 PID 1344 wrote to memory of 1492 1344 rundll32.exe 30 PID 1344 wrote to memory of 1492 1344 rundll32.exe 30 PID 1344 wrote to memory of 1492 1344 rundll32.exe 30 PID 1344 wrote to memory of 1492 1344 rundll32.exe 30 PID 1344 wrote to memory of 1492 1344 rundll32.exe 30 PID 1344 wrote to memory of 1492 1344 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a6df8d51b26c7bd3a7376f6118049f1c37a91ee0b2f1ada2b86c561d1170e1b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a6df8d51b26c7bd3a7376f6118049f1c37a91ee0b2f1ada2b86c561d1170e1b.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-