Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:17
Static task
static1
Behavioral task
behavioral1
Sample
5f287d8b207645d9cfb47ff2aacb7ed2a6769fa14b1fe78c45a73efc73f0a84c.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5f287d8b207645d9cfb47ff2aacb7ed2a6769fa14b1fe78c45a73efc73f0a84c.dll
Resource
win10v2004-en-20220113
General
-
Target
5f287d8b207645d9cfb47ff2aacb7ed2a6769fa14b1fe78c45a73efc73f0a84c.dll
-
Size
282KB
-
MD5
d4177e2e225f0ba2c3a4575db7ea1a13
-
SHA1
983b44349669b40d276a4647ff9d7c0338860985
-
SHA256
5f287d8b207645d9cfb47ff2aacb7ed2a6769fa14b1fe78c45a73efc73f0a84c
-
SHA512
7fcce384e32d12f75577af3044f430259b2e104e236d0306506f90b38544d39cbc980878e76f52984790db16b55ca3f3e9976f893e08831237010fd31df17e92
Malware Config
Extracted
zloader
banking
banking
https://iloveyoubaby1.pro/gate.php
https://idsakjfsanfaskj.com/gate.php
https://fslakdasjdnsasjsj.com/gate.php
https://dksadjsahnfaskmsa.com/gate.php
https://dskdsajdsahda.info/gate.php
https://dskdsajdsadasda.info/gate.php
https://dskjdsadhsahjsas.info/gate.php
https://dsjadjsadjsadjafsa.info/gate.php
https://fsakjdsafasifkajfaf.pro/gate.php
https://djsadhsadsadjashs.pro/gate.php
-
build_id
6
Signatures
-
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Blocklisted process makes network request 7 IoCs
Processes:
msiexec.exeflow pid process 5 584 msiexec.exe 7 584 msiexec.exe 13 584 msiexec.exe 19 584 msiexec.exe 21 584 msiexec.exe 23 584 msiexec.exe 25 584 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kiebh = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Uvpoo\\yfxi.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1668 set thread context of 584 1668 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 584 msiexec.exe Token: SeSecurityPrivilege 584 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1592 wrote to memory of 1668 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1668 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1668 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1668 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1668 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1668 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1668 1592 rundll32.exe rundll32.exe PID 1668 wrote to memory of 584 1668 rundll32.exe msiexec.exe PID 1668 wrote to memory of 584 1668 rundll32.exe msiexec.exe PID 1668 wrote to memory of 584 1668 rundll32.exe msiexec.exe PID 1668 wrote to memory of 584 1668 rundll32.exe msiexec.exe PID 1668 wrote to memory of 584 1668 rundll32.exe msiexec.exe PID 1668 wrote to memory of 584 1668 rundll32.exe msiexec.exe PID 1668 wrote to memory of 584 1668 rundll32.exe msiexec.exe PID 1668 wrote to memory of 584 1668 rundll32.exe msiexec.exe PID 1668 wrote to memory of 584 1668 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f287d8b207645d9cfb47ff2aacb7ed2a6769fa14b1fe78c45a73efc73f0a84c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f287d8b207645d9cfb47ff2aacb7ed2a6769fa14b1fe78c45a73efc73f0a84c.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:584