Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
14-04-2022 02:16
Static task
static1
Behavioral task
behavioral1
Sample
tmp.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
tmp.dll
Resource
win10v2004-20220310-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
tmp.dll
-
Size
444KB
-
MD5
c6b350b0d6f8dc37c144f76a57c9dbe7
-
SHA1
e637d8a29d46281a5fa97d84af1dfe1d72223157
-
SHA256
6348bded936831629494c1d820fe8e3dbe3fb4d9f96940bbb4ca0c1872bef0ad
-
SHA512
5220ff154b731a8a1d1e768552fee037cacb12412eff931384c105d4caa5483da64c11b4839ab44885214d4d8831b280687b54b2438f89a230fce68bf7692dff
Score
10/10
Malware Config
Extracted
Family
zloader
Botnet
26/03
C2
https://vfgthujbxd.xyz/milagrecf.php
https://todiks.xyz/milagrecf.php
Attributes
-
build_id
108
rc4.plain
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Waivula = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Adqii\\xoer.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4796 set thread context of 4396 4796 rundll32.exe 91 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 4396 msiexec.exe Token: SeSecurityPrivilege 4396 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1980 wrote to memory of 4796 1980 rundll32.exe 80 PID 1980 wrote to memory of 4796 1980 rundll32.exe 80 PID 1980 wrote to memory of 4796 1980 rundll32.exe 80 PID 4796 wrote to memory of 4396 4796 rundll32.exe 91 PID 4796 wrote to memory of 4396 4796 rundll32.exe 91 PID 4796 wrote to memory of 4396 4796 rundll32.exe 91 PID 4796 wrote to memory of 4396 4796 rundll32.exe 91 PID 4796 wrote to memory of 4396 4796 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tmp.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tmp.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-