Analysis
-
max time kernel
68s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 14:36
Static task
static1
Behavioral task
behavioral1
Sample
568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe
Resource
win10v2004-20220414-en
General
-
Target
568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe
-
Size
525KB
-
MD5
0c4e34983b797d71c1398962286a62d0
-
SHA1
9314f44fc32b0afb38c466781727c8fca2b2f0a9
-
SHA256
568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d
-
SHA512
03144ce6410b416f961c7f6e5c9fa4112be54acfcd2ed554837c55aaa07227b09e88bcc09fce44a81f0f85cda06c8a0474ecfd08164c818e189aeb883a277d72
Malware Config
Extracted
zloader
goldhub
27_mario
https://209711.com/process.php
https://106311.com/out.php
https://124331.com/success.php
https://1646zz.com/api.php
-
build_id
75
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Suewigan = "C:\\Users\\Admin\\AppData\\Roaming\\Fyyhwo\\yzkesif.exe" msiexec.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1324 set thread context of 1384 1324 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 24 PID 1384 set thread context of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1324 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1860 msiexec.exe Token: SeSecurityPrivilege 1860 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1324 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1384 1324 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 24 PID 1324 wrote to memory of 1384 1324 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 24 PID 1324 wrote to memory of 1384 1324 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 24 PID 1324 wrote to memory of 1384 1324 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 24 PID 1324 wrote to memory of 1384 1324 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 24 PID 1384 wrote to memory of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29 PID 1384 wrote to memory of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29 PID 1384 wrote to memory of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29 PID 1384 wrote to memory of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29 PID 1384 wrote to memory of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29 PID 1384 wrote to memory of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29 PID 1384 wrote to memory of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29 PID 1384 wrote to memory of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29 PID 1384 wrote to memory of 1860 1384 568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe"C:\Users\Admin\AppData\Local\Temp\568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe"C:\Users\Admin\AppData\Local\Temp\568b1d18c325b2be411b21a34c0b5a12bfa93201694ca0a2109876007078b99d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-