Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 14:51
Static task
static1
Behavioral task
behavioral1
Sample
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe
Resource
win10v2004-20220414-en
General
-
Target
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe
-
Size
186KB
-
MD5
1a4775088c588d35892b94a21753f311
-
SHA1
244f880cc3880a7676590ba6b78c542acbcd73d0
-
SHA256
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b
-
SHA512
330f97c6616c5b9c19e23118c398d6b29c23d21f35984a59943483b896873b16b090f2ccfe6718e2d4d3b45a2a5e5c9b3177bf545a4b028c0e138181a0f01c74
Malware Config
Extracted
zloader
CanadaLoads
Nerino
https://makemoneywithforexxs.com/bFnF0y1r/7QKpXmV3Pz.php
https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php
https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php
https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php
https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php
https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php
https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php
https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php
-
build_id
73
Signatures
-
suricata: ET MALWARE Zbot POST Request to C2
suricata: ET MALWARE Zbot POST Request to C2
-
Blocklisted process makes network request 4 IoCs
Processes:
msiexec.exeflow pid process 63 4996 msiexec.exe 64 4996 msiexec.exe 65 4996 msiexec.exe 66 4996 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Emduosso = "C:\\Users\\Admin\\AppData\\Roaming\\Ehkeaw\\aqag.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exedescription pid process target process PID 2820 set thread context of 4996 2820 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe msiexec.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3524 2820 WerFault.exe 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 4996 msiexec.exe Token: SeSecurityPrivilege 4996 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exedescription pid process target process PID 2820 wrote to memory of 4996 2820 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe msiexec.exe PID 2820 wrote to memory of 4996 2820 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe msiexec.exe PID 2820 wrote to memory of 4996 2820 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe msiexec.exe PID 2820 wrote to memory of 4996 2820 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe msiexec.exe PID 2820 wrote to memory of 4996 2820 5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe"C:\Users\Admin\AppData\Local\Temp\5b821c154dfe563768b9d2ee69f4483aab84d150a8c2c2da16219d340cb9000b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 2922⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2820 -ip 28201⤵PID:2772