Analysis
-
max time kernel
486s -
max time network
489s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 06:35
Static task
static1
Behavioral task
behavioral1
Sample
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe
Resource
win7-20220901-en
General
-
Target
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe
-
Size
139KB
-
MD5
d91b498e5fc6c91e1e86b339407b58f7
-
SHA1
369e3c4646a69b99a797e0e288fd3145e2a6f35a
-
SHA256
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9
-
SHA512
b981f7c4857327708233bf7e44bfb485c1cc7148ca850a63b12f854215edb583f5a499109d67b94f213226d23d0f4e0e5d04b888193fa5e799e30f051e9c9dbd
-
SSDEEP
3072:XBkH2At/3YyzX2OpphkGYI+C9AwcOZBJ7zk:n6/IAFkCDc+BJ7w
Malware Config
Extracted
zloader
vlenie10
obnova10
https://kdsidsiadsakfsas.com/gate.php
https://jdafiasfjsafahhfs.com/gate.php
https://dasifosafjasfhasf.com/gate.php
https://kasfajfsafhasfhaf.com/gate.php
https://fdsjfjdsfjdsjfdjsfh.com/gate.php
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
-
build_id
1869505135
Signatures
-
Blocklisted process makes network request 28 IoCs
flow pid Process 31 5060 msiexec.exe 32 5060 msiexec.exe 34 5060 msiexec.exe 36 5060 msiexec.exe 38 5060 msiexec.exe 40 5060 msiexec.exe 42 5060 msiexec.exe 44 5060 msiexec.exe 47 5060 msiexec.exe 49 5060 msiexec.exe 56 5060 msiexec.exe 57 5060 msiexec.exe 58 5060 msiexec.exe 59 5060 msiexec.exe 60 5060 msiexec.exe 61 5060 msiexec.exe 62 5060 msiexec.exe 63 5060 msiexec.exe 64 5060 msiexec.exe 65 5060 msiexec.exe 66 5060 msiexec.exe 67 5060 msiexec.exe 68 5060 msiexec.exe 69 5060 msiexec.exe 70 5060 msiexec.exe 71 5060 msiexec.exe 72 5060 msiexec.exe 73 5060 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Abedig = "C:\\Users\\Admin\\AppData\\Roaming\\Ufbo\\adeg.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4344 set thread context of 5060 4344 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 90 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 5060 msiexec.exe Token: SeSecurityPrivilege 5060 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4344 wrote to memory of 5060 4344 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 90 PID 4344 wrote to memory of 5060 4344 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 90 PID 4344 wrote to memory of 5060 4344 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 90 PID 4344 wrote to memory of 5060 4344 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 90 PID 4344 wrote to memory of 5060 4344 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe"C:\Users\Admin\AppData\Local\Temp\cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe"1⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5060
-