Analysis
-
max time kernel
4294207s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
09-03-2022 02:43
Static task
static1
Behavioral task
behavioral1
Sample
14c47cc16c55060409202302048d8b8f97c9b3fa462d7710ab91bb3f3f7a75e8.dll
Resource
win7-20220223-en
General
-
Target
14c47cc16c55060409202302048d8b8f97c9b3fa462d7710ab91bb3f3f7a75e8.dll
-
Size
370KB
-
MD5
243104faac6863b5b4a4263f4040f021
-
SHA1
597fbf324045926a5e3cc1617dc89f83ddd49792
-
SHA256
14c47cc16c55060409202302048d8b8f97c9b3fa462d7710ab91bb3f3f7a75e8
-
SHA512
3a0bf5a2731155559faf5167e00662fa69e18f81dfc671ac3132eec84ae0b4293429fda477f8bbb5d8576d64e6d36eac09e00a69c124ae99dc30f37e7868d985
Malware Config
Extracted
zloader
nut
30/11
https://aogmphregion.org.za/construction.php
https://aayanent.com/backups.php
https://eagle-family.co.uk/panel.php
https://khanbuilders.uk/wp-punch.php
https://construbienesjg.com/wp-punch.php
https://despautyajobssooka.ml/wp-smarts.php
-
build_id
257
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 5 1432 msiexec.exe 6 1432 msiexec.exe 7 1432 msiexec.exe 8 1432 msiexec.exe 9 1432 msiexec.exe 10 1432 msiexec.exe 23 1432 msiexec.exe 25 1432 msiexec.exe 26 1432 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 768 set thread context of 1432 768 regsvr32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1432 msiexec.exe Token: SeSecurityPrivilege 1432 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1680 wrote to memory of 768 1680 regsvr32.exe 27 PID 1680 wrote to memory of 768 1680 regsvr32.exe 27 PID 1680 wrote to memory of 768 1680 regsvr32.exe 27 PID 1680 wrote to memory of 768 1680 regsvr32.exe 27 PID 1680 wrote to memory of 768 1680 regsvr32.exe 27 PID 1680 wrote to memory of 768 1680 regsvr32.exe 27 PID 1680 wrote to memory of 768 1680 regsvr32.exe 27 PID 768 wrote to memory of 1432 768 regsvr32.exe 30 PID 768 wrote to memory of 1432 768 regsvr32.exe 30 PID 768 wrote to memory of 1432 768 regsvr32.exe 30 PID 768 wrote to memory of 1432 768 regsvr32.exe 30 PID 768 wrote to memory of 1432 768 regsvr32.exe 30 PID 768 wrote to memory of 1432 768 regsvr32.exe 30 PID 768 wrote to memory of 1432 768 regsvr32.exe 30 PID 768 wrote to memory of 1432 768 regsvr32.exe 30 PID 768 wrote to memory of 1432 768 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\14c47cc16c55060409202302048d8b8f97c9b3fa462d7710ab91bb3f3f7a75e8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\14c47cc16c55060409202302048d8b8f97c9b3fa462d7710ab91bb3f3f7a75e8.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-