Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 14:51
Static task
static1
Behavioral task
behavioral1
Sample
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe
Resource
win10v2004-20220414-en
General
-
Target
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe
-
Size
186KB
-
MD5
1a4775088c588d35892b94a21753f311
-
SHA1
244f880cc3880a7676590ba6b78c542acbcd73d0
-
SHA256
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b
-
SHA512
330f97c6616c5b9c19e23118c398d6b29c23d21f35984a59943483b896873b16b090f2ccfe6718e2d4d3b45a2a5e5c9b3177bf545a4b028c0e138181a0f01c74
Malware Config
Extracted
zloader
CanadaLoads
Nerino
https://makemoneywithforexxs.com/bFnF0y1r/7QKpXmV3Pz.php
https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php
https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php
https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php
https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php
https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php
https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php
https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php
-
build_id
73
Signatures
-
Blocklisted process makes network request 15 IoCs
flow pid Process 5 2024 msiexec.exe 6 2024 msiexec.exe 7 2024 msiexec.exe 8 2024 msiexec.exe 9 2024 msiexec.exe 11 2024 msiexec.exe 12 2024 msiexec.exe 13 2024 msiexec.exe 14 2024 msiexec.exe 15 2024 msiexec.exe 16 2024 msiexec.exe 19 2024 msiexec.exe 20 2024 msiexec.exe 21 2024 msiexec.exe 22 2024 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Izivm = "C:\\Users\\Admin\\AppData\\Roaming\\Fyif\\afqu.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 560 set thread context of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2024 msiexec.exe Token: SeSecurityPrivilege 2024 msiexec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 560 wrote to memory of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27 PID 560 wrote to memory of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27 PID 560 wrote to memory of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27 PID 560 wrote to memory of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27 PID 560 wrote to memory of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27 PID 560 wrote to memory of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27 PID 560 wrote to memory of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27 PID 560 wrote to memory of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27 PID 560 wrote to memory of 2024 560 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe"C:\Users\Admin\AppData\Local\Temp\5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2024
-