Analysis Overview
SHA256
cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf
Threat Level: Known bad
The file cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf was found to be: Known bad.
Malicious Activity Summary
Suspicious use of NtCreateUserProcessOtherParentProcess
Zloader, Terdot, DELoader, ZeusSphinx
Suspicious use of SetThreadContext
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-05-10 17:46
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-05-10 17:46
Reported
2022-05-10 19:02
Platform
win7-20220414-en
Max time kernel
123s
Max time network
49s
Command Line
Signatures
Suspicious use of NtCreateUserProcessOtherParentProcess
| Description | Indicator | Process | Target |
| PID 536 created 1208 | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | C:\Windows\Explorer.EXE |
Zloader, Terdot, DELoader, ZeusSphinx
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 536 set thread context of 1644 | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | C:\Windows\SysWOW64\msiexec.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\SysWOW64\msiexec.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\SysWOW64\msiexec.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe
"C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe"
C:\Windows\SysWOW64\msiexec.exe
msiexec.exe
Network
Files
memory/536-54-0x0000000000400000-0x000000000042D000-memory.dmp
memory/536-55-0x0000000000400000-0x00000000005C8000-memory.dmp
memory/1644-56-0x0000000000130000-0x000000000015D000-memory.dmp
memory/1644-58-0x0000000000130000-0x000000000015D000-memory.dmp
memory/1644-59-0x0000000000000000-mapping.dmp
memory/1644-60-0x0000000075B61000-0x0000000075B63000-memory.dmp
memory/1644-61-0x0000000000130000-0x000000000015D000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-05-10 17:46
Reported
2022-05-10 19:02
Platform
win10v2004-20220414-en
Max time kernel
117s
Max time network
104s
Command Line
Signatures
Suspicious use of NtCreateUserProcessOtherParentProcess
| Description | Indicator | Process | Target |
| PID 1444 created 3064 | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | C:\Windows\Explorer.EXE |
Zloader, Terdot, DELoader, ZeusSphinx
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1444 set thread context of 3676 | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | C:\Windows\SysWOW64\msiexec.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\SysWOW64\msiexec.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\SysWOW64\msiexec.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1444 wrote to memory of 3676 | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | C:\Windows\SysWOW64\msiexec.exe |
| PID 1444 wrote to memory of 3676 | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | C:\Windows\SysWOW64\msiexec.exe |
| PID 1444 wrote to memory of 3676 | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | C:\Windows\SysWOW64\msiexec.exe |
| PID 1444 wrote to memory of 3676 | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | C:\Windows\SysWOW64\msiexec.exe |
| PID 1444 wrote to memory of 3676 | N/A | C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe | C:\Windows\SysWOW64\msiexec.exe |
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe
"C:\Users\Admin\AppData\Local\Temp\cec54379d0c951fbe85b7f678bc3faab29bd9643375825d105a568ba2890abbf.exe"
C:\Windows\SysWOW64\msiexec.exe
msiexec.exe
Network
| Country | Destination | Domain | Proto |
| NL | 20.50.201.200:443 | tcp | |
| NL | 67.26.111.254:80 | tcp | |
| NL | 67.26.111.254:80 | tcp | |
| NL | 67.26.111.254:80 | tcp |
Files
memory/1444-130-0x0000000000400000-0x000000000042D000-memory.dmp
memory/1444-131-0x0000000000400000-0x00000000005C8000-memory.dmp
memory/3676-132-0x0000000000000000-mapping.dmp
memory/3676-133-0x00000000003C0000-0x00000000003ED000-memory.dmp
memory/3676-134-0x00000000003C0000-0x00000000003ED000-memory.dmp