Analysis
-
max time kernel
547s -
max time network
549s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 06:35
Behavioral task
behavioral1
Sample
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64.dll
Resource
win10v2004-20220812-en
General
-
Target
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64.dll
-
Size
128KB
-
MD5
33d2581d7d36acde729ce52c5d106d79
-
SHA1
48b9cbe0f6922d6c844ab7b7122bc0cd389bf711
-
SHA256
66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64
-
SHA512
75acc63cb9c38c0dd3d1759c93f38fc41e62b8853146267b6d80c7b979cf9bf281d3bd44519f1f6a9085d161a4a3d5abc5c71702c914382645e55af3fd6c8770
-
SSDEEP
3072:f9r5C53D8cD2blVIevrYc/vdDwfYX8D5/x6tT8Wfgpwylb:ft5C53D8ckM6sDW5g6yl
Malware Config
Extracted
zloader
04/02
https://brewaz.club/milagrecf.php
https://buhjike.host/milagrecf.php
-
build_id
49
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 5 1788 msiexec.exe 6 1788 msiexec.exe 9 1788 msiexec.exe 10 1788 msiexec.exe 11 1788 msiexec.exe 15 1788 msiexec.exe 16 1788 msiexec.exe 17 1788 msiexec.exe 18 1788 msiexec.exe 19 1788 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Haeg = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Ceod\\body.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 864 set thread context of 1788 864 regsvr32.exe 29 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1788 msiexec.exe Token: SeSecurityPrivilege 1788 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1752 wrote to memory of 864 1752 regsvr32.exe 28 PID 1752 wrote to memory of 864 1752 regsvr32.exe 28 PID 1752 wrote to memory of 864 1752 regsvr32.exe 28 PID 1752 wrote to memory of 864 1752 regsvr32.exe 28 PID 1752 wrote to memory of 864 1752 regsvr32.exe 28 PID 1752 wrote to memory of 864 1752 regsvr32.exe 28 PID 1752 wrote to memory of 864 1752 regsvr32.exe 28 PID 864 wrote to memory of 1788 864 regsvr32.exe 29 PID 864 wrote to memory of 1788 864 regsvr32.exe 29 PID 864 wrote to memory of 1788 864 regsvr32.exe 29 PID 864 wrote to memory of 1788 864 regsvr32.exe 29 PID 864 wrote to memory of 1788 864 regsvr32.exe 29 PID 864 wrote to memory of 1788 864 regsvr32.exe 29 PID 864 wrote to memory of 1788 864 regsvr32.exe 29 PID 864 wrote to memory of 1788 864 regsvr32.exe 29 PID 864 wrote to memory of 1788 864 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\66f49a261b6086dfdd1c3e2a21f7cb746aa35707490cbd64693d66383ba54c64.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-