Analysis
-
max time kernel
595s -
max time network
597s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 06:35
Static task
static1
Behavioral task
behavioral1
Sample
0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1.dll
Resource
win10v2004-20220812-en
General
-
Target
0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1.dll
-
Size
422KB
-
MD5
f55920966b4970588ce643af0fcc03a7
-
SHA1
97c44c58f24358442cb1811a7694e5b395e82d61
-
SHA256
0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1
-
SHA512
b5e6f91e65eacd6c1ad5f563f0d9184fd21fb88848008c7ea568d7c40c63fcbf217eeee2830a521313a3152e538821a469630fe951e760405972afae8516023e
-
SSDEEP
12288:yClc4hq+Ytl63+YzGKBTpJHtvgqYe7S9S:Tlc4kBl6OabpFtGgS0
Malware Config
Extracted
zloader
-
build_id
49
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 5 680 msiexec.exe 6 680 msiexec.exe 7 680 msiexec.exe 8 680 msiexec.exe 9 680 msiexec.exe 13 680 msiexec.exe 14 680 msiexec.exe 15 680 msiexec.exe 16 680 msiexec.exe 17 680 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Figoahha = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Obcud\\fycuba.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1156 set thread context of 680 1156 rundll32.exe 28 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 680 msiexec.exe Token: SeSecurityPrivilege 680 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1604 wrote to memory of 1156 1604 rundll32.exe 27 PID 1156 wrote to memory of 680 1156 rundll32.exe 28 PID 1156 wrote to memory of 680 1156 rundll32.exe 28 PID 1156 wrote to memory of 680 1156 rundll32.exe 28 PID 1156 wrote to memory of 680 1156 rundll32.exe 28 PID 1156 wrote to memory of 680 1156 rundll32.exe 28 PID 1156 wrote to memory of 680 1156 rundll32.exe 28 PID 1156 wrote to memory of 680 1156 rundll32.exe 28 PID 1156 wrote to memory of 680 1156 rundll32.exe 28 PID 1156 wrote to memory of 680 1156 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-