Analysis
-
max time kernel
84s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 10:13
Static task
static1
Behavioral task
behavioral1
Sample
6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe
Resource
win7-20220414-en
General
-
Target
6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe
-
Size
282KB
-
MD5
24a14eb9657fff6c151b279556cba1f0
-
SHA1
843624d36b63100beb5bc05e4ddec5659317eb9d
-
SHA256
6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141
-
SHA512
30043da4f8aa33085f2d8238d7151c06f74c8376a3bc2f9deba492e2692d3ed79b7737f416eed11fed9f40d273f84917717b7ecfa745b4fb30274c689664f024
Malware Config
Extracted
zloader
r2
r2
https://notsweets.net/LKhwojehDgwegSDG/gateJKjdsh.php
https://olpons.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://karamelliar.org/LKhwojehDgwegSDG/gateJKjdsh.php
https://dogrunn.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://azoraz.net/LKhwojehDgwegSDG/gateJKjdsh.php
-
build_id
136
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1836 created 1232 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 6 -
Blocklisted process makes network request 6 IoCs
flow pid Process 5 1220 msiexec.exe 7 1220 msiexec.exe 9 1220 msiexec.exe 11 1220 msiexec.exe 13 1220 msiexec.exe 15 1220 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1836 set thread context of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe Token: SeSecurityPrivilege 1220 msiexec.exe Token: SeSecurityPrivilege 1220 msiexec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28 PID 1836 wrote to memory of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28 PID 1836 wrote to memory of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28 PID 1836 wrote to memory of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28 PID 1836 wrote to memory of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28 PID 1836 wrote to memory of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28 PID 1836 wrote to memory of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28 PID 1836 wrote to memory of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28 PID 1836 wrote to memory of 1220 1836 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe"C:\Users\Admin\AppData\Local\Temp\6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1220
-