Analysis
-
max time kernel
134s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 16:48
Static task
static1
Behavioral task
behavioral1
Sample
3920ecf9f7dc8f7fe34721ff41f5955b2ed0943eae2031ff602ae92bc6f3b7c5.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3920ecf9f7dc8f7fe34721ff41f5955b2ed0943eae2031ff602ae92bc6f3b7c5.vbs
Resource
win10v2004-en-20220112
General
-
Target
3920ecf9f7dc8f7fe34721ff41f5955b2ed0943eae2031ff602ae92bc6f3b7c5.vbs
-
Size
1.2MB
-
MD5
8fe28d9e48e7f52c6a7a80c351fa00ee
-
SHA1
6c137516acc48185f3a916647a729a03f94b09c3
-
SHA256
3920ecf9f7dc8f7fe34721ff41f5955b2ed0943eae2031ff602ae92bc6f3b7c5
-
SHA512
6058373532310935ff6b1952a57b512f85e2deee9740e46c3722f0d1adfae23d1471fe3442aa3527ec50bd82815326d0f8fa65845872ff0d4ccd2d0318cb933e
Malware Config
Extracted
zloader
main
02.04.2020
https://klill.com/sound.php
https://geost.com/sound.php
https://tarsilh.com/sound.php
https://lildor.com/sound.php
https://imosey.com/sound.php
https://obeaf.com/sound.php
https://pheia.com/sound.php
https://smenard.com/sound.php
-
build_id
32
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 1652 rundll32.exe 27 -
Loads dropped DLL 4 IoCs
pid Process 1608 rundll32.exe 1608 rundll32.exe 1608 rundll32.exe 1608 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qyogte = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Byugs\\avek.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1608 set thread context of 668 1608 rundll32.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 668 msiexec.exe Token: SeSecurityPrivilege 668 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 WScript.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1608 1548 rundll32.exe 29 PID 1548 wrote to memory of 1608 1548 rundll32.exe 29 PID 1548 wrote to memory of 1608 1548 rundll32.exe 29 PID 1548 wrote to memory of 1608 1548 rundll32.exe 29 PID 1548 wrote to memory of 1608 1548 rundll32.exe 29 PID 1548 wrote to memory of 1608 1548 rundll32.exe 29 PID 1548 wrote to memory of 1608 1548 rundll32.exe 29 PID 1608 wrote to memory of 668 1608 rundll32.exe 30 PID 1608 wrote to memory of 668 1608 rundll32.exe 30 PID 1608 wrote to memory of 668 1608 rundll32.exe 30 PID 1608 wrote to memory of 668 1608 rundll32.exe 30 PID 1608 wrote to memory of 668 1608 rundll32.exe 30 PID 1608 wrote to memory of 668 1608 rundll32.exe 30 PID 1608 wrote to memory of 668 1608 rundll32.exe 30 PID 1608 wrote to memory of 668 1608 rundll32.exe 30 PID 1608 wrote to memory of 668 1608 rundll32.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3920ecf9f7dc8f7fe34721ff41f5955b2ed0943eae2031ff602ae92bc6f3b7c5.vbs"1⤵
- Suspicious use of FindShellTrayWindow
PID:1284
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\xiSiDJtJfVUnjTv.exe,DllRegisterServer1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\xiSiDJtJfVUnjTv.exe,DllRegisterServer2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-