Analysis
-
max time kernel
154s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 13:01
Behavioral task
behavioral1
Sample
648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296.dll
Resource
win7-20220414-en
General
-
Target
648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296.dll
-
Size
156KB
-
MD5
0e2a67089d12bf0bfb06f54ab52369d6
-
SHA1
57ff02529e54b54bd4e5d51ccb28eae041163ebf
-
SHA256
648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296
-
SHA512
416de0aa9061dbed9e11cdb077f6a81bb45c15ed07e6be1d3df12561e0c47e23daaf4fa1e4d999f22354dac300c3add4300efb2a58b60b935cbab06811b0b357
Malware Config
Extracted
zloader
nut
14/08
https://girldowcahohorme.tk/wp-parsing.php
http://thegamegolfmagazine.com/wp-parsing.php
http://truvaluconsulting.com/wp-parsing.php
https://blog2.textbookrush.com/wp-parsing.php
https://curiosidadez.com.br/wp-parsing.php
https://nonchothetohear.cf/wp-parsing.php
https://sicupira8.com.br/wp-parsing.php
https://titaniumgamers.com/wp-parsing.php
-
build_id
109
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1364 created 1312 1364 regsvr32.exe Explorer.EXE -
Blocklisted process makes network request 14 IoCs
Processes:
msiexec.exeflow pid process 7 1164 msiexec.exe 8 1164 msiexec.exe 9 1164 msiexec.exe 10 1164 msiexec.exe 11 1164 msiexec.exe 12 1164 msiexec.exe 14 1164 msiexec.exe 16 1164 msiexec.exe 18 1164 msiexec.exe 19 1164 msiexec.exe 20 1164 msiexec.exe 21 1164 msiexec.exe 22 1164 msiexec.exe 23 1164 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1364 set thread context of 1164 1364 regsvr32.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
regsvr32.exepid process 1364 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
regsvr32.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1364 regsvr32.exe Token: SeSecurityPrivilege 1164 msiexec.exe Token: SeSecurityPrivilege 1164 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1256 wrote to memory of 1364 1256 regsvr32.exe regsvr32.exe PID 1256 wrote to memory of 1364 1256 regsvr32.exe regsvr32.exe PID 1256 wrote to memory of 1364 1256 regsvr32.exe regsvr32.exe PID 1256 wrote to memory of 1364 1256 regsvr32.exe regsvr32.exe PID 1256 wrote to memory of 1364 1256 regsvr32.exe regsvr32.exe PID 1256 wrote to memory of 1364 1256 regsvr32.exe regsvr32.exe PID 1256 wrote to memory of 1364 1256 regsvr32.exe regsvr32.exe PID 1364 wrote to memory of 1164 1364 regsvr32.exe msiexec.exe PID 1364 wrote to memory of 1164 1364 regsvr32.exe msiexec.exe PID 1364 wrote to memory of 1164 1364 regsvr32.exe msiexec.exe PID 1364 wrote to memory of 1164 1364 regsvr32.exe msiexec.exe PID 1364 wrote to memory of 1164 1364 regsvr32.exe msiexec.exe PID 1364 wrote to memory of 1164 1364 regsvr32.exe msiexec.exe PID 1364 wrote to memory of 1164 1364 regsvr32.exe msiexec.exe PID 1364 wrote to memory of 1164 1364 regsvr32.exe msiexec.exe PID 1364 wrote to memory of 1164 1364 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1312
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296.dll3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1164
-