Overview
overview
10Static
static
1044ede6e1b9...0b.dll
windows7-x64
1044ede6e1b9...0b.dll
windows10-2004-x64
10830700df4f...46.dll
windows7-x64
10830700df4f...46.dll
windows10-2004-x64
10b89d80ca3f...79.dll
windows7-x64
10b89d80ca3f...79.dll
windows10-2004-x64
10cad0968f5a...b9.exe
windows7-x64
10cad0968f5a...b9.exe
windows10-2004-x64
10e3932ab83b...e8.dll
windows7-x64
10e3932ab83b...e8.dll
windows10-2004-x64
10Resubmissions
03-08-2023 07:52
230803-jqkwdsca99 1027-07-2023 11:24
230727-nhyvhaec35 1026-12-2022 13:39
221226-qx588sgb9y 1026-12-2022 13:39
221226-qx1zhsgb9x 1026-12-2022 13:38
221226-qxxbbsda57 1026-12-2022 13:38
221226-qxjp8sda56 10Analysis
-
max time kernel
1583s -
max time network
1648s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03-08-2023 07:52
Behavioral task
behavioral1
Sample
44ede6e1b9be1c013f13d82645f7a9cff7d92b267778f19b46aa5c1f7fa3c10b.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
44ede6e1b9be1c013f13d82645f7a9cff7d92b267778f19b46aa5c1f7fa3c10b.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46.dll
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
b89d80ca3f0a5da24b8b768d2d5eb35ca1322f6bc2b01e265465ac95d7d61279.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
b89d80ca3f0a5da24b8b768d2d5eb35ca1322f6bc2b01e265465ac95d7d61279.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
cad0968f5ab3bedeffef68bbe18f92946fb97967cef59970157029480ed15bb9.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
Resource
win10v2004-20230703-en
General
-
Target
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
-
Size
111KB
-
MD5
e3564138588cba04c873bd054458f8b9
-
SHA1
157ec7421e1333b714d01a750b6d5d6517a92c45
-
SHA256
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8
-
SHA512
2a2e8ce45a928bcffdb40ebf6559c1f071bb3feccfd9cfe355e593acb559ecf84858cf4474708d311317ab08b3f981eba7c8b80dceae973839a0eec9049665c8
-
SSDEEP
1536:3ui/9Xb791Wff4K84oeRnobxxm2ShclQaLMin8F5vAC+WEQbAmTjTpeyv0+gPzff:H/J7jWHT/oegcaQF5XEgHbpeyvfgT
Malware Config
Extracted
zloader
DLLobnova
1017
https://fdsjfjdsfjdsjfdjsfh.com/gate.php
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
https://dsdjfhdsufudhjas.info/gate.php
https://fdsjfjdsfjdsdsjajjs.info/gate.php
https://idisaudhasdhasdj.info/gate.php
-
build_id
28
Signatures
-
Blocklisted process makes network request 51 IoCs
flow pid Process 7 2316 msiexec.exe 9 2316 msiexec.exe 11 2316 msiexec.exe 13 2316 msiexec.exe 15 2316 msiexec.exe 17 2316 msiexec.exe 19 2316 msiexec.exe 21 2316 msiexec.exe 23 2316 msiexec.exe 24 2316 msiexec.exe 26 2316 msiexec.exe 27 2316 msiexec.exe 28 2316 msiexec.exe 29 2316 msiexec.exe 30 2316 msiexec.exe 31 2316 msiexec.exe 32 2316 msiexec.exe 33 2316 msiexec.exe 35 2316 msiexec.exe 36 2316 msiexec.exe 37 2316 msiexec.exe 38 2316 msiexec.exe 39 2316 msiexec.exe 40 2316 msiexec.exe 41 2316 msiexec.exe 43 2316 msiexec.exe 45 2316 msiexec.exe 46 2316 msiexec.exe 47 2316 msiexec.exe 48 2316 msiexec.exe 49 2316 msiexec.exe 50 2316 msiexec.exe 51 2316 msiexec.exe 52 2316 msiexec.exe 54 2316 msiexec.exe 55 2316 msiexec.exe 56 2316 msiexec.exe 57 2316 msiexec.exe 58 2316 msiexec.exe 59 2316 msiexec.exe 60 2316 msiexec.exe 61 2316 msiexec.exe 63 2316 msiexec.exe 64 2316 msiexec.exe 65 2316 msiexec.exe 66 2316 msiexec.exe 67 2316 msiexec.exe 68 2316 msiexec.exe 69 2316 msiexec.exe 70 2316 msiexec.exe 73 2316 msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Windows\CurrentVersion\Run\Odifub = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Fyyc\\faegu.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1328 set thread context of 2316 1328 regsvr32.exe 31 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2316 msiexec.exe Token: SeSecurityPrivilege 2316 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1328 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1328 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1328 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1328 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1328 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1328 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1328 2336 regsvr32.exe 28 PID 1328 wrote to memory of 2316 1328 regsvr32.exe 31 PID 1328 wrote to memory of 2316 1328 regsvr32.exe 31 PID 1328 wrote to memory of 2316 1328 regsvr32.exe 31 PID 1328 wrote to memory of 2316 1328 regsvr32.exe 31 PID 1328 wrote to memory of 2316 1328 regsvr32.exe 31 PID 1328 wrote to memory of 2316 1328 regsvr32.exe 31 PID 1328 wrote to memory of 2316 1328 regsvr32.exe 31 PID 1328 wrote to memory of 2316 1328 regsvr32.exe 31 PID 1328 wrote to memory of 2316 1328 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f7662734e3d7c4c945df2026bcea91
SHA15f16a1f5b400c48db2d7679b3a6ded61890b827f
SHA256c82f409561343cc1b56606fbc3ba7413bb9a95a7b216afd8d937ef18412146c9
SHA512166c669eb5ee13afd060b2e64cc20812d4be722b5b8d93e458ddb8deb464036449f914ba9a8130747b063eceec4d1b2ed45ffac4f5a533969f9d31796a7af131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c06ffad916d98092cc88fe5e4ce5ebaa
SHA1845307b172c108c96b3de9a834765270b4f2879a
SHA256c81b55a37090d1f0b9cb461889bc630da933d687a6115d8cfeaa1ea0b4c2c0e1
SHA512a6c2d1ca6b1303d7dc8a2def8edb87ce68f7393f8d29449265114382642819320ab2a3ea146bc9bb8cd3e6f936df4701c5857b43e770bac8b206563051bcb60c
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27