Analysis
-
max time kernel
130s -
max time network
130s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:52
Static task
static1
Behavioral task
behavioral1
Sample
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll
Resource
win10v2004-en-20220113
General
-
Target
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll
-
Size
310KB
-
MD5
b9d425b1970b5fd03aed67053d97916d
-
SHA1
6b198494ce7d94fe26e72f4d0de776c897d9231a
-
SHA256
16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c
-
SHA512
621449a17709fb703c18e84b31956a1fefd7a0204743061c401f7208a12c9a51df6f60eee0be155ca290d0336e46b7fdef8eaa4267dc8147916f43d824cb989d
Malware Config
Extracted
zloader
banking
banking
https://iloveyoubaby1.pro/gate.php
https://idsakjfsanfaskj.com/gate.php
https://fslakdasjdnsasjsj.com/gate.php
https://dksadjsahnfaskmsa.com/gate.php
https://dskdsajdsahda.info/gate.php
https://dskdsajdsadasda.info/gate.php
https://dskjdsadhsahjsas.info/gate.php
https://dsjadjsadjsadjafsa.info/gate.php
https://fsakjdsafasifkajfaf.pro/gate.php
https://djsadhsadsadjashs.pro/gate.php
-
build_id
2
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
msiexec.exeflow pid process 5 2012 msiexec.exe 7 2012 msiexec.exe 13 2012 msiexec.exe 19 2012 msiexec.exe 21 2012 msiexec.exe 23 2012 msiexec.exe 25 2012 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ereqmim = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Lugaw\\icebypz.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 828 set thread context of 2012 828 rundll32.exe msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 2012 msiexec.exe Token: SeSecurityPrivilege 2012 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1692 wrote to memory of 828 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 828 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 828 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 828 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 828 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 828 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 828 1692 rundll32.exe rundll32.exe PID 828 wrote to memory of 2012 828 rundll32.exe msiexec.exe PID 828 wrote to memory of 2012 828 rundll32.exe msiexec.exe PID 828 wrote to memory of 2012 828 rundll32.exe msiexec.exe PID 828 wrote to memory of 2012 828 rundll32.exe msiexec.exe PID 828 wrote to memory of 2012 828 rundll32.exe msiexec.exe PID 828 wrote to memory of 2012 828 rundll32.exe msiexec.exe PID 828 wrote to memory of 2012 828 rundll32.exe msiexec.exe PID 828 wrote to memory of 2012 828 rundll32.exe msiexec.exe PID 828 wrote to memory of 2012 828 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2012