Analysis
-
max time kernel
107s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2022 07:12
Static task
static1
Behavioral task
behavioral1
Sample
511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll
Resource
win10v2004-20220812-en
General
-
Target
511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll
-
Size
372KB
-
MD5
70e58943ac83f5d6467e5e173ec66b28
-
SHA1
ab2dd9bb32849fcb4c8be3ca8277c7e3bd89b941
-
SHA256
511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1
-
SHA512
a13926885a211f814a8c3d19f4feda64c73876c1e04e93bd2fffa6ae6e03f100ea415743e8c23810f6402ae3f8d73adb3003defbc12d409656b395c3ebc7a913
-
SSDEEP
6144:tZ9hTPbmQmla02F8iU+7831GRHLjA8rWHzSOcwNTn:XDPb8002F8iU+43ERrjjrCnNz
Malware Config
Extracted
zloader
main
10.02.2020
https://fibulu.org/sound.php
https://tarynak.org/sound.php
-
build_id
6
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Icedubi = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Bugo\\ucif.dll,DllRegisterServer" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4948 set thread context of 4664 4948 rundll32.exe 88 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 4664 msiexec.exe Token: SeSecurityPrivilege 4664 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2264 wrote to memory of 4948 2264 rundll32.exe 80 PID 2264 wrote to memory of 4948 2264 rundll32.exe 80 PID 2264 wrote to memory of 4948 2264 rundll32.exe 80 PID 4948 wrote to memory of 4664 4948 rundll32.exe 88 PID 4948 wrote to memory of 4664 4948 rundll32.exe 88 PID 4948 wrote to memory of 4664 4948 rundll32.exe 88 PID 4948 wrote to memory of 4664 4948 rundll32.exe 88 PID 4948 wrote to memory of 4664 4948 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\511dab2388e7a98cc70a8e6abbfe3c47f170c9fc616941a2c05c08b1fc449ef1.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-