Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 05:53
Static task
static1
Behavioral task
behavioral1
Sample
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe
Resource
win10v2004-20220414-en
General
-
Target
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe
-
Size
204KB
-
MD5
3c444a0943effa540416d6e44fbcb13d
-
SHA1
e9d69e561e6adbac9e5db5375fd6b138d2fb3d2b
-
SHA256
aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1
-
SHA512
7496257548078d4f23229545d48f23a828c8afffca78bf6c0a3c4d78a2b83439629bff2d7b6753e78c214d1960abf1a535a61a8cfd25e10285228200b305781a
Malware Config
Extracted
zloader
CanadaLoads
Nerino
https://tempmailsin112.com/bFnF0y1r/7QKpXmV3Pz.php
https://roadonroadonroad.com/bFnF0y1r/7QKpXmV3Pz.php
https://roadtocaliss.com/bFnF0y1r/7QKpXmV3Pz.php
https://referrer222.com/bFnF0y1r/7QKpXmV3Pz.php
https://makeitrainfordee.com/bFnF0y1r/7QKpXmV3Pz.php
https://makeitrainforffeer.com/bFnF0y1r/7QKpXmV3Pz.php
https://torosdodos221.com/bFnF0y1r/7QKpXmV3Pz.php
https://morningcoffeeclasd.com/bFnF0y1r/7QKpXmV3Pz.php
https://rememberingtss.com/bFnF0y1r/7QKpXmV3Pz.php
https://dodavova012.com/bFnF0y1r/7QKpXmV3Pz.php
-
build_id
67
Signatures
-
suricata: ET MALWARE Zbot POST Request to C2
suricata: ET MALWARE Zbot POST Request to C2
-
Blocklisted process makes network request 10 IoCs
flow pid Process 58 2436 msiexec.exe 59 2436 msiexec.exe 60 2436 msiexec.exe 61 2436 msiexec.exe 62 2436 msiexec.exe 63 2436 msiexec.exe 64 2436 msiexec.exe 65 2436 msiexec.exe 66 2436 msiexec.exe 67 2436 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ezoci = "C:\\Users\\Admin\\AppData\\Roaming\\Ygiz\\diopaf.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1040 set thread context of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe 99 -
Program crash 1 IoCs
pid pid_target Process procid_target 4964 1040 WerFault.exe 82 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2436 msiexec.exe Token: SeSecurityPrivilege 2436 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe 99 PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe 99 PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe 99 PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe 99 PID 1040 wrote to memory of 2436 1040 aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe"C:\Users\Admin\AppData\Local\Temp\aed3dfe631190b233b06f472c55af6dd1d222bc07c3ac32284a29555bf6bf1e1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 2282⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1040 -ip 10401⤵PID:1256