Analysis
-
max time kernel
143s -
max time network
167s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:52
Static task
static1
Behavioral task
behavioral1
Sample
161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e.dll
Resource
win10v2004-en-20220112
General
-
Target
161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e.dll
-
Size
258KB
-
MD5
b57d728b9b71593edb74984985412ebd
-
SHA1
71394a1e2056ab7938d00d65ea4e74fb92178630
-
SHA256
161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e
-
SHA512
c277df221bbd76884468d499c0a9fdff8443efd2e2540f56678f6d8831e315c27d3f51d6129344652daffa215a6f4e63915f7665bbe487a5a1f4dfbd3bcb26a4
Malware Config
Extracted
zloader
banking
banking
https://iloveyoubaby1.pro/gate.php
https://idsakjfsanfaskj.com/gate.php
https://fslakdasjdnsasjsj.com/gate.php
https://dksadjsahnfaskmsa.com/gate.php
https://dskdsajdsahda.info/gate.php
https://dskdsajdsadasda.info/gate.php
https://dskjdsadhsahjsas.info/gate.php
https://dsjadjsadjsadjafsa.info/gate.php
https://fsakjdsafasifkajfaf.pro/gate.php
https://djsadhsadsadjashs.pro/gate.php
-
build_id
2
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
msiexec.exeflow pid process 5 1020 msiexec.exe 7 1020 msiexec.exe 13 1020 msiexec.exe 19 1020 msiexec.exe 21 1020 msiexec.exe 23 1020 msiexec.exe 25 1020 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rareutmu = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Akob\\voigi.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2032 set thread context of 1020 2032 rundll32.exe msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1020 msiexec.exe Token: SeSecurityPrivilege 1020 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1660 wrote to memory of 2032 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2032 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2032 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2032 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2032 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2032 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 2032 1660 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1020 2032 rundll32.exe msiexec.exe PID 2032 wrote to memory of 1020 2032 rundll32.exe msiexec.exe PID 2032 wrote to memory of 1020 2032 rundll32.exe msiexec.exe PID 2032 wrote to memory of 1020 2032 rundll32.exe msiexec.exe PID 2032 wrote to memory of 1020 2032 rundll32.exe msiexec.exe PID 2032 wrote to memory of 1020 2032 rundll32.exe msiexec.exe PID 2032 wrote to memory of 1020 2032 rundll32.exe msiexec.exe PID 2032 wrote to memory of 1020 2032 rundll32.exe msiexec.exe PID 2032 wrote to memory of 1020 2032 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\161dabd778b2d24a7cae425bc2349e3db840acf49222c6067359ec7a01d3e05e.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1020