Analysis
-
max time kernel
127s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21-09-2022 07:12
Static task
static1
Behavioral task
behavioral1
Sample
511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll
Resource
win10v2004-20220812-en
General
-
Target
511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll
-
Size
372KB
-
MD5
70e58943ac83f5d6467e5e173ec66b28
-
SHA1
ab2dd9bb32849fcb4c8be3ca8277c7e3bd89b941
-
SHA256
511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1
-
SHA512
a13926885a211f814a8c3d19f4feda64c73876c1e04e93bd2fffa6ae6e03f100ea415743e8c23810f6402ae3f8d73adb3003defbc12d409656b395c3ebc7a913
-
SSDEEP
6144:tZ9hTPbmQmla02F8iU+7831GRHLjA8rWHzSOcwNTn:XDPb8002F8iU+43ERrjjrCnNz
Malware Config
Extracted
zloader
main
10.02.2020
https://fibulu.org/sound.php
https://tarynak.org/sound.php
-
build_id
6
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ybhy = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Edefca\\giab.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1196 set thread context of 1332 1196 rundll32.exe 28 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1332 msiexec.exe Token: SeSecurityPrivilege 1332 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1196 1328 rundll32.exe 27 PID 1328 wrote to memory of 1196 1328 rundll32.exe 27 PID 1328 wrote to memory of 1196 1328 rundll32.exe 27 PID 1328 wrote to memory of 1196 1328 rundll32.exe 27 PID 1328 wrote to memory of 1196 1328 rundll32.exe 27 PID 1328 wrote to memory of 1196 1328 rundll32.exe 27 PID 1328 wrote to memory of 1196 1328 rundll32.exe 27 PID 1196 wrote to memory of 1332 1196 rundll32.exe 28 PID 1196 wrote to memory of 1332 1196 rundll32.exe 28 PID 1196 wrote to memory of 1332 1196 rundll32.exe 28 PID 1196 wrote to memory of 1332 1196 rundll32.exe 28 PID 1196 wrote to memory of 1332 1196 rundll32.exe 28 PID 1196 wrote to memory of 1332 1196 rundll32.exe 28 PID 1196 wrote to memory of 1332 1196 rundll32.exe 28 PID 1196 wrote to memory of 1332 1196 rundll32.exe 28 PID 1196 wrote to memory of 1332 1196 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-