Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:20
Static task
static1
Behavioral task
behavioral1
Sample
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766.dll
Resource
win10v2004-en-20220113
General
-
Target
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766.dll
-
Size
250KB
-
MD5
5970ecc1e667dbfac22baece0305655e
-
SHA1
5e0dbef986f2456081aa27b8f06430abfa3ab102
-
SHA256
57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766
-
SHA512
fb99473005cc9fa442cea28ba46b5befd0fea8d09f1a527303e8a02036de7d535bc1cf70505c0d8223e2bbcc6e65ef9d0c54ce0161f864c5e1840f928762365d
Malware Config
Extracted
zloader
DLLobnova
spamCA
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
https://dsdjfhdsufudhjas.info/gate.php
https://fdsjfjdsfjdsdsjajjs.info/gate.php
https://idisaudhasdhasdj.info/gate.php
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
-
build_id
12
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 5 1384 msiexec.exe 7 1384 msiexec.exe 9 1384 msiexec.exe 11 1384 msiexec.exe 13 1384 msiexec.exe 15 1384 msiexec.exe 17 1384 msiexec.exe 19 1384 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Insemuop = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Befiuv\\acywymi.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1428 set thread context of 1384 1428 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1384 msiexec.exe Token: SeSecurityPrivilege 1384 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1428 1292 rundll32.exe 27 PID 1292 wrote to memory of 1428 1292 rundll32.exe 27 PID 1292 wrote to memory of 1428 1292 rundll32.exe 27 PID 1292 wrote to memory of 1428 1292 rundll32.exe 27 PID 1292 wrote to memory of 1428 1292 rundll32.exe 27 PID 1292 wrote to memory of 1428 1292 rundll32.exe 27 PID 1292 wrote to memory of 1428 1292 rundll32.exe 27 PID 1428 wrote to memory of 1384 1428 rundll32.exe 30 PID 1428 wrote to memory of 1384 1428 rundll32.exe 30 PID 1428 wrote to memory of 1384 1428 rundll32.exe 30 PID 1428 wrote to memory of 1384 1428 rundll32.exe 30 PID 1428 wrote to memory of 1384 1428 rundll32.exe 30 PID 1428 wrote to memory of 1384 1428 rundll32.exe 30 PID 1428 wrote to memory of 1384 1428 rundll32.exe 30 PID 1428 wrote to memory of 1384 1428 rundll32.exe 30 PID 1428 wrote to memory of 1384 1428 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57c7f0bc7a487df329eb3e8b19debde9ce1821e250123227cdc2dfbdd8b1b766.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-