Overview
overview
10Static
static
1044ede6e1b9...0b.dll
windows7-x64
1044ede6e1b9...0b.dll
windows10-2004-x64
10830700df4f...46.dll
windows7-x64
10830700df4f...46.dll
windows10-2004-x64
10b89d80ca3f...79.dll
windows7-x64
10b89d80ca3f...79.dll
windows10-2004-x64
10cad0968f5a...b9.exe
windows7-x64
10cad0968f5a...b9.exe
windows10-2004-x64
10e3932ab83b...e8.dll
windows7-x64
10e3932ab83b...e8.dll
windows10-2004-x64
10Resubmissions
03-08-2023 07:52
230803-jqkwdsca99 1027-07-2023 11:24
230727-nhyvhaec35 1026-12-2022 13:39
221226-qx588sgb9y 1026-12-2022 13:39
221226-qx1zhsgb9x 1026-12-2022 13:38
221226-qxxbbsda57 1026-12-2022 13:38
221226-qxjp8sda56 10Analysis
-
max time kernel
1797s -
max time network
1799s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2023 07:52
Behavioral task
behavioral1
Sample
44ede6e1b9be1c013f13d82645f7a9cff7d92b267778f19b46aa5c1f7fa3c10b.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
44ede6e1b9be1c013f13d82645f7a9cff7d92b267778f19b46aa5c1f7fa3c10b.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46.dll
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
b89d80ca3f0a5da24b8b768d2d5eb35ca1322f6bc2b01e265465ac95d7d61279.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
b89d80ca3f0a5da24b8b768d2d5eb35ca1322f6bc2b01e265465ac95d7d61279.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
Resource
win10v2004-20230703-en
General
-
Target
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe
-
Size
139KB
-
MD5
d91b498e5fc6c91e1e86b339407b58f7
-
SHA1
369e3c4646a69b99a797e0e288fd3145e2a6f35a
-
SHA256
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9
-
SHA512
b981f7c4857327708233bf7e44bfb485c1cc7148ca850a63b12f854215edb583f5a499109d67b94f213226d23d0f4e0e5d04b888193fa5e799e30f051e9c9dbd
-
SSDEEP
3072:XBkH2At/3YyzX2OpphkGYI+C9AwcOZBJ7zk:n6/IAFkCDc+BJ7w
Malware Config
Extracted
zloader
vlenie10
obnova10
https://kdsidsiadsakfsas.com/gate.php
https://jdafiasfjsafahhfs.com/gate.php
https://dasifosafjasfhasf.com/gate.php
https://kasfajfsafhasfhaf.com/gate.php
https://fdsjfjdsfjdsjfdjsfh.com/gate.php
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
-
build_id
1869505135
Signatures
-
Blocklisted process makes network request 20 IoCs
flow pid Process 70 5052 msiexec.exe 78 5052 msiexec.exe 82 5052 msiexec.exe 84 5052 msiexec.exe 106 5052 msiexec.exe 107 5052 msiexec.exe 108 5052 msiexec.exe 109 5052 msiexec.exe 126 5052 msiexec.exe 127 5052 msiexec.exe 128 5052 msiexec.exe 129 5052 msiexec.exe 146 5052 msiexec.exe 147 5052 msiexec.exe 148 5052 msiexec.exe 149 5052 msiexec.exe 164 5052 msiexec.exe 165 5052 msiexec.exe 166 5052 msiexec.exe 167 5052 msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ebah = "C:\\Users\\Admin\\AppData\\Roaming\\Dobiyh\\agahubu.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4004 set thread context of 5052 4004 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 95 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 5052 msiexec.exe Token: SeSecurityPrivilege 5052 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4004 wrote to memory of 5052 4004 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 95 PID 4004 wrote to memory of 5052 4004 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 95 PID 4004 wrote to memory of 5052 4004 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 95 PID 4004 wrote to memory of 5052 4004 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 95 PID 4004 wrote to memory of 5052 4004 cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe"C:\Users\Admin\AppData\Local\Temp\cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5052
-