Analysis
-
max time kernel
144s -
max time network
206s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 05:52
Static task
static1
Behavioral task
behavioral1
Sample
889722c569e213d506fd37d940b1056cac7b1baf981276313178d5cc429e13e8.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
889722c569e213d506fd37d940b1056cac7b1baf981276313178d5cc429e13e8.dll
Resource
win10v2004-20220414-en
General
-
Target
889722c569e213d506fd37d940b1056cac7b1baf981276313178d5cc429e13e8.dll
-
Size
334KB
-
MD5
68614fa2335fb83b70f21e9a52d21564
-
SHA1
108dbe69275819d24db77fc168acf55eedf12889
-
SHA256
889722c569e213d506fd37d940b1056cac7b1baf981276313178d5cc429e13e8
-
SHA512
6a1ead3489c7bc789b4e4e4eed665e4d1036e14191449e2604bb6ef72e6cf6345f89e494c5beeac80f15d60b9d2d08bb93298b9bd0dcdd1a9511df5a0ed9475f
Malware Config
Extracted
zloader
27/02
https://soficatan.site/milagrecf.php
https://barbeyo.xyz/milagrecf.php
-
build_id
70
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ciadu = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Hebiug\\hocou.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 652 set thread context of 836 652 rundll32.exe 29 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 836 msiexec.exe Token: SeSecurityPrivilege 836 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2024 wrote to memory of 652 2024 rundll32.exe 28 PID 2024 wrote to memory of 652 2024 rundll32.exe 28 PID 2024 wrote to memory of 652 2024 rundll32.exe 28 PID 2024 wrote to memory of 652 2024 rundll32.exe 28 PID 2024 wrote to memory of 652 2024 rundll32.exe 28 PID 2024 wrote to memory of 652 2024 rundll32.exe 28 PID 2024 wrote to memory of 652 2024 rundll32.exe 28 PID 652 wrote to memory of 836 652 rundll32.exe 29 PID 652 wrote to memory of 836 652 rundll32.exe 29 PID 652 wrote to memory of 836 652 rundll32.exe 29 PID 652 wrote to memory of 836 652 rundll32.exe 29 PID 652 wrote to memory of 836 652 rundll32.exe 29 PID 652 wrote to memory of 836 652 rundll32.exe 29 PID 652 wrote to memory of 836 652 rundll32.exe 29 PID 652 wrote to memory of 836 652 rundll32.exe 29 PID 652 wrote to memory of 836 652 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\889722c569e213d506fd37d940b1056cac7b1baf981276313178d5cc429e13e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\889722c569e213d506fd37d940b1056cac7b1baf981276313178d5cc429e13e8.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-