Analysis
-
max time kernel
190s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 20:53
Static task
static1
Behavioral task
behavioral1
Sample
72c6263c691245f4b8bb28faf17e5140393f6906cd976a5a71efc6da76964f8a.dll
Resource
win7-20220414-en
General
-
Target
72c6263c691245f4b8bb28faf17e5140393f6906cd976a5a71efc6da76964f8a.dll
-
Size
636KB
-
MD5
7aa4d61b349fe9ae9249d084bdfbab0f
-
SHA1
e0f1294e23ac717b41a87484b8444fe403db328d
-
SHA256
72c6263c691245f4b8bb28faf17e5140393f6906cd976a5a71efc6da76964f8a
-
SHA512
6f627c83f39e493cbace6be0b93058b80f9d8a9988a83df6459da3804fd16e1c9ae0edd330e6d6e1f5ced8e2d8a12b7f913bce821cf310ab562c3e7887063a4c
Malware Config
Extracted
zloader
divader
poll
https://fqnceas.su/gate.php
https://fqlocpeas.ru/gate.php
https://dksaiijn.ru/gate.php
https://dksafjasnf.su/gate.php
https://fjsafasfsa.ru/gate.php
https://fjskoijafsa.ru/gate.php
https://kochamkkkras.ru/gate.php
https://uookqihwdid.ru/gate.php
https://iqowijsdakm.ru/gate.php
https://wiewjdmkfjn.ru/gate.php
-
build_id
116
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kiud = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Ikloo\\zoah.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 628 set thread context of 840 628 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 840 msiexec.exe Token: SeSecurityPrivilege 840 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1792 wrote to memory of 628 1792 rundll32.exe rundll32.exe PID 1792 wrote to memory of 628 1792 rundll32.exe rundll32.exe PID 1792 wrote to memory of 628 1792 rundll32.exe rundll32.exe PID 1792 wrote to memory of 628 1792 rundll32.exe rundll32.exe PID 1792 wrote to memory of 628 1792 rundll32.exe rundll32.exe PID 1792 wrote to memory of 628 1792 rundll32.exe rundll32.exe PID 1792 wrote to memory of 628 1792 rundll32.exe rundll32.exe PID 628 wrote to memory of 840 628 rundll32.exe msiexec.exe PID 628 wrote to memory of 840 628 rundll32.exe msiexec.exe PID 628 wrote to memory of 840 628 rundll32.exe msiexec.exe PID 628 wrote to memory of 840 628 rundll32.exe msiexec.exe PID 628 wrote to memory of 840 628 rundll32.exe msiexec.exe PID 628 wrote to memory of 840 628 rundll32.exe msiexec.exe PID 628 wrote to memory of 840 628 rundll32.exe msiexec.exe PID 628 wrote to memory of 840 628 rundll32.exe msiexec.exe PID 628 wrote to memory of 840 628 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72c6263c691245f4b8bb28faf17e5140393f6906cd976a5a71efc6da76964f8a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72c6263c691245f4b8bb28faf17e5140393f6906cd976a5a71efc6da76964f8a.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-