Analysis
-
max time kernel
514s -
max time network
578s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 06:35
Static task
static1
Behavioral task
behavioral1
Sample
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe
Resource
win7-20220901-en
General
-
Target
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe
-
Size
139KB
-
MD5
d91b498e5fc6c91e1e86b339407b58f7
-
SHA1
369e3c4646a69b99a797e0e288fd3145e2a6f35a
-
SHA256
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9
-
SHA512
b981f7c4857327708233bf7e44bfb485c1cc7148ca850a63b12f854215edb583f5a499109d67b94f213226d23d0f4e0e5d04b888193fa5e799e30f051e9c9dbd
-
SSDEEP
3072:XBkH2At/3YyzX2OpphkGYI+C9AwcOZBJ7zk:n6/IAFkCDc+BJ7w
Malware Config
Extracted
zloader
vlenie10
obnova10
https://kdsidsiadsakfsas.com/gate.php
https://jdafiasfjsafahhfs.com/gate.php
https://dasifosafjasfhasf.com/gate.php
https://kasfajfsafhasfhaf.com/gate.php
https://fdsjfjdsfjdsjfdjsfh.com/gate.php
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
-
build_id
1869505135
Signatures
-
Blocklisted process makes network request 31 IoCs
flow pid Process 5 1860 msiexec.exe 7 1860 msiexec.exe 9 1860 msiexec.exe 11 1860 msiexec.exe 13 1860 msiexec.exe 15 1860 msiexec.exe 17 1860 msiexec.exe 19 1860 msiexec.exe 21 1860 msiexec.exe 23 1860 msiexec.exe 25 1860 msiexec.exe 26 1860 msiexec.exe 27 1860 msiexec.exe 28 1860 msiexec.exe 29 1860 msiexec.exe 30 1860 msiexec.exe 31 1860 msiexec.exe 32 1860 msiexec.exe 33 1860 msiexec.exe 34 1860 msiexec.exe 35 1860 msiexec.exe 36 1860 msiexec.exe 38 1860 msiexec.exe 39 1860 msiexec.exe 40 1860 msiexec.exe 41 1860 msiexec.exe 42 1860 msiexec.exe 43 1860 msiexec.exe 44 1860 msiexec.exe 45 1860 msiexec.exe 46 1860 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yhadufuf = "C:\\Users\\Admin\\AppData\\Roaming\\Iguf\\igubbic.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1744 set thread context of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1860 msiexec.exe Token: SeSecurityPrivilege 1860 msiexec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27 PID 1744 wrote to memory of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27 PID 1744 wrote to memory of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27 PID 1744 wrote to memory of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27 PID 1744 wrote to memory of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27 PID 1744 wrote to memory of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27 PID 1744 wrote to memory of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27 PID 1744 wrote to memory of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27 PID 1744 wrote to memory of 1860 1744 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe"C:\Users\Admin\AppData\Local\Temp\cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe"1⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1860
-