Analysis
-
max time kernel
120s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 19:28
Static task
static1
Behavioral task
behavioral1
Sample
invest_20.dll
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
General
-
Target
invest_20.dll
-
Size
453KB
-
MD5
c9affd7934e4d9b4dec4c40b2a71a381
-
SHA1
aac940f9906034938cd657ed2ba21bc675e6ae20
-
SHA256
31cf42b2a7c5c558f44cfc67684cc344c17d4946d3a1e0b2cecb8eb58173cb2f
-
SHA512
82d18e7815ed38c07ca0b6ec82cb2e30451d0e02a9cd761e1d55d6f05955fac3df303d96bac89dea6dfa3b90def945ca413ae9854dd7b24fbcc18e6c6040f18a
-
SSDEEP
6144:JWm73CWN0OejuX3VR4YCrqGro3O32YHFhIaA1fjYDr1qhHkmviFJf0:JKGK6Vtiq0UOdFhqLYwP2Jf0
Malware Config
Extracted
Family
zloader
Botnet
goldhub
Campaign
01.04.20
C2
https://105711.com/docs.php
https://209711.com/process.php
https://106311.com/comegetsome.php
https://124331.com/success.php
Attributes
-
build_id
42
rc4.plain
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yfkiri = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Gybyo\\xuodir.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 1392 2220 rundll32.exe 85 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1392 msiexec.exe Token: SeSecurityPrivilege 1392 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2220 1952 rundll32.exe 82 PID 1952 wrote to memory of 2220 1952 rundll32.exe 82 PID 1952 wrote to memory of 2220 1952 rundll32.exe 82 PID 2220 wrote to memory of 1392 2220 rundll32.exe 85 PID 2220 wrote to memory of 1392 2220 rundll32.exe 85 PID 2220 wrote to memory of 1392 2220 rundll32.exe 85 PID 2220 wrote to memory of 1392 2220 rundll32.exe 85 PID 2220 wrote to memory of 1392 2220 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\invest_20.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\invest_20.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-