Analysis
-
max time kernel
496s -
max time network
500s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 06:35
Behavioral task
behavioral1
Sample
0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1_unpacked.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1_unpacked.dll
Resource
win10v2004-20220901-en
General
-
Target
0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1_unpacked.dll
-
Size
156KB
-
MD5
d9260a4b6dbbd14005070ea871f4cfd2
-
SHA1
456ce2295431e297036bf9f185b6a80d1866f849
-
SHA256
d010b0b5bff25d4cc9b65d8f24e4ae5b596804d4c60c506e993d312323a881bb
-
SHA512
43ba2387df4cae14d3b696d9ac23977e32eadd30dff24b862fc9dcc33d9b73bdfba40d6363b8906627454cbc76635720c64b35d7bbeecf27ba71673c62957fbe
-
SSDEEP
3072:EcuwpCTxFeqTqLtg2l3z1TR9lPl4Bq89CP9qCL3qZnd2+gvcYwl6:tuwpCTxFIljz9lPCBq8jaL
Malware Config
Extracted
zloader
-
build_id
49
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 32 5044 msiexec.exe 34 5044 msiexec.exe 36 5044 msiexec.exe 37 5044 msiexec.exe 38 5044 msiexec.exe 45 5044 msiexec.exe 46 5044 msiexec.exe 48 5044 msiexec.exe 49 5044 msiexec.exe 50 5044 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Budiah = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Behu\\yhbyfo.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1296 set thread context of 5044 1296 regsvr32.exe 92 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 5044 msiexec.exe Token: SeSecurityPrivilege 5044 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4844 wrote to memory of 1296 4844 regsvr32.exe 83 PID 4844 wrote to memory of 1296 4844 regsvr32.exe 83 PID 4844 wrote to memory of 1296 4844 regsvr32.exe 83 PID 1296 wrote to memory of 5044 1296 regsvr32.exe 92 PID 1296 wrote to memory of 5044 1296 regsvr32.exe 92 PID 1296 wrote to memory of 5044 1296 regsvr32.exe 92 PID 1296 wrote to memory of 5044 1296 regsvr32.exe 92 PID 1296 wrote to memory of 5044 1296 regsvr32.exe 92
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1_unpacked.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0d533321292f6854d7f9705a738d58ee5941c93b52674681083ec5c21a987ab1_unpacked.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-