Analysis
-
max time kernel
489s -
max time network
497s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 06:35
Behavioral task
behavioral1
Sample
58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe
Resource
win10v2004-20220812-en
General
-
Target
58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe
-
Size
141KB
-
MD5
a74a0a84a2ed0674e540ac9aa4405638
-
SHA1
6ea4c0b33b660908b6032252c345c1936364390e
-
SHA256
58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222
-
SHA512
a7dc0515208a02ebaec31b39c74bcf366ea2deaac7f7bbbe2b748273c53868144dec8e129f909a8b5d46c0598db384581977f51a42b2b19fb1da15d62699262c
-
SSDEEP
3072:Ze6xD8emYCB6K8WfJnIFwWmVteLz+isF:ZeqfmXFXW8wzc
Malware Config
Extracted
zloader
-test2
web7-test2
https://45.72.3.132/web7643/gate.php
-
build_id
929195383
Signatures
-
Blocklisted process makes network request 15 IoCs
flow pid Process 22 1220 msiexec.exe 25 1220 msiexec.exe 29 1220 msiexec.exe 36 1220 msiexec.exe 39 1220 msiexec.exe 46 1220 msiexec.exe 47 1220 msiexec.exe 51 1220 msiexec.exe 52 1220 msiexec.exe 53 1220 msiexec.exe 54 1220 msiexec.exe 55 1220 msiexec.exe 56 1220 msiexec.exe 57 1220 msiexec.exe 58 1220 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cify = "C:\\Users\\Admin\\AppData\\Roaming\\Foacbu\\hayh.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 568 set thread context of 1220 568 58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe 84 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1220 msiexec.exe Token: SeSecurityPrivilege 1220 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 568 wrote to memory of 1220 568 58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe 84 PID 568 wrote to memory of 1220 568 58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe 84 PID 568 wrote to memory of 1220 568 58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe 84 PID 568 wrote to memory of 1220 568 58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe 84 PID 568 wrote to memory of 1220 568 58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe"C:\Users\Admin\AppData\Local\Temp\58afcdc59220bd54561c650d1c9f1ebed87e517dc747dfc7d243bd19708b7222_unpacked.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1220
-