Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 05:53
Static task
static1
Behavioral task
behavioral1
Sample
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe
Resource
win10v2004-20220414-en
General
-
Target
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe
-
Size
204KB
-
MD5
3c444a0943effa540416d6e44fbcb13d
-
SHA1
e9d69e561e6adbac9e5db5375fd6b138d2fb3d2b
-
SHA256
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1
-
SHA512
7496257548078d4f23229545d48f23a828c8afffca78bf6c0a3c4d78a2b83439629bff2d7b6753e78c214d1960abf1a535a61a8cfd25e10285228200b305781a
Malware Config
Extracted
zloader
CanadaLoads
Nerino
https://tempmailsin112.com/bFnF0y1r/7QKpXmV3Pz.php
https://roadonroadonroad.com/bFnF0y1r/7QKpXmV3Pz.php
https://roadtocaliss.com/bFnF0y1r/7QKpXmV3Pz.php
https://referrer222.com/bFnF0y1r/7QKpXmV3Pz.php
https://makeitrainfordee.com/bFnF0y1r/7QKpXmV3Pz.php
https://makeitrainforffeer.com/bFnF0y1r/7QKpXmV3Pz.php
https://torosdodos221.com/bFnF0y1r/7QKpXmV3Pz.php
https://morningcoffeeclasd.com/bFnF0y1r/7QKpXmV3Pz.php
https://rememberingtss.com/bFnF0y1r/7QKpXmV3Pz.php
https://dodavova012.com/bFnF0y1r/7QKpXmV3Pz.php
-
build_id
67
Signatures
-
suricata: ET MALWARE Zbot POST Request to C2
suricata: ET MALWARE Zbot POST Request to C2
-
Blocklisted process makes network request 10 IoCs
Processes:
msiexec.exeflow pid process 58 2436 msiexec.exe 59 2436 msiexec.exe 60 2436 msiexec.exe 61 2436 msiexec.exe 62 2436 msiexec.exe 63 2436 msiexec.exe 64 2436 msiexec.exe 65 2436 msiexec.exe 66 2436 msiexec.exe 67 2436 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ezoci = "C:\\Users\\Admin\\AppData\\Roaming\\Ygiz\\diopaf.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exedescription pid process target process PID 1040 set thread context of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe msiexec.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4964 1040 WerFault.exe aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 2436 msiexec.exe Token: SeSecurityPrivilege 2436 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exedescription pid process target process PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe msiexec.exe PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe msiexec.exe PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe msiexec.exe PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe msiexec.exe PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe"C:\Users\Admin\AppData\Local\Temp\aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 2282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1040 -ip 10401⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1040-130-0x0000000000B88000-0x0000000000BA2000-memory.dmpFilesize
104KB
-
memory/1040-131-0x0000000000B40000-0x0000000000B66000-memory.dmpFilesize
152KB
-
memory/1040-132-0x0000000000400000-0x00000000007EF000-memory.dmpFilesize
3.9MB
-
memory/2436-133-0x0000000000000000-mapping.dmp
-
memory/2436-134-0x00000000006C0000-0x00000000006E9000-memory.dmpFilesize
164KB
-
memory/2436-135-0x00000000006C0000-0x00000000006E9000-memory.dmpFilesize
164KB