Analysis
-
max time kernel
155s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
049c5f625953b02a7aba1c904a14851cdd998ea21ee1e604016f8ba37c952ed1.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
049c5f625953b02a7aba1c904a14851cdd998ea21ee1e604016f8ba37c952ed1.dll
Resource
win10v2004-en-20220113
General
-
Target
049c5f625953b02a7aba1c904a14851cdd998ea21ee1e604016f8ba37c952ed1.dll
-
Size
245KB
-
MD5
6a75b82edf296a8ae16fe701e1498322
-
SHA1
87fc5a506b0e60ed1b1fde86e3a08b7d7ab1e23d
-
SHA256
049c5f625953b02a7aba1c904a14851cdd998ea21ee1e604016f8ba37c952ed1
-
SHA512
269f714764a7ef03998348ad9e92f20aadac3a10bd3c1c7808baa9962679d960c230b7c5aa0668cbb4b3fab987becd353d30d4982c38ce7d0f8ff261e64caea1
Malware Config
Extracted
zloader
DLLobnova
nekriptovaniy
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
https://dsdjfhdsufudhjas.name/gate.php
https://dsdjfhd9ddksaas.com/gate.php
https://dsdjfhdsufudhjas.pw/gate.php
https://dsdjfhd9ddksaas.ru/gate.php
https://dsdjfhdsufudhjas.su/gate.php
https://kdsadisadijdsasm2.com/gate.php
https://dsdjfhdsufudhjas.net/gate.php
https://dsdjfhd9ddksaas.eu/gate.php
-
build_id
9
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Iqxy = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Ewfiic\\xysa.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 580 set thread context of 1116 580 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1116 msiexec.exe Token: SeSecurityPrivilege 1116 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 524 wrote to memory of 580 524 rundll32.exe 27 PID 524 wrote to memory of 580 524 rundll32.exe 27 PID 524 wrote to memory of 580 524 rundll32.exe 27 PID 524 wrote to memory of 580 524 rundll32.exe 27 PID 524 wrote to memory of 580 524 rundll32.exe 27 PID 524 wrote to memory of 580 524 rundll32.exe 27 PID 524 wrote to memory of 580 524 rundll32.exe 27 PID 580 wrote to memory of 1116 580 rundll32.exe 30 PID 580 wrote to memory of 1116 580 rundll32.exe 30 PID 580 wrote to memory of 1116 580 rundll32.exe 30 PID 580 wrote to memory of 1116 580 rundll32.exe 30 PID 580 wrote to memory of 1116 580 rundll32.exe 30 PID 580 wrote to memory of 1116 580 rundll32.exe 30 PID 580 wrote to memory of 1116 580 rundll32.exe 30 PID 580 wrote to memory of 1116 580 rundll32.exe 30 PID 580 wrote to memory of 1116 580 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\049c5f625953b02a7aba1c904a14851cdd998ea21ee1e604016f8ba37c952ed1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\049c5f625953b02a7aba1c904a14851cdd998ea21ee1e604016f8ba37c952ed1.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-