Resubmissions
10-08-2023 17:12
230810-vq913aff23 1010-08-2023 16:29
230810-tznnragg4y 1009-11-2020 20:57
201109-4wpwk1zk1e 10Analysis
-
max time kernel
2605s -
max time network
2289s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
10-08-2023 17:12
Static task
static1
1 signatures
General
-
Target
zte(1).dll
-
Size
473KB
-
MD5
2b99305fdd451f60f935efb4fd4fb9be
-
SHA1
d0c7f705d3d94ccea33654f940c7b2e77448fc3d
-
SHA256
8761a16b210e215456f4ad4dffeb624ee2b2b3646971860dc5ffb0f8b82658b0
-
SHA512
7fb8307f9a669fd1ba37a41d4f611d61124370b514fa290fd0d9ad1dcba8f2c0a37e3999ee507944f03d66ac3907ba56bf3fbaaef5409e5ae5e7746f6d7bca0f
-
SSDEEP
12288:T2s615320KPnJHFlswhjmoUYtIdySZYBk:TZ8V98jmotI2S
Malware Config
Extracted
Family
zloader
Botnet
bot5
Campaign
bot5
C2
https://militanttra.at/owg.php
Attributes
-
build_id
15
rc4.plain
rsa_pubkey.plain
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Run\Faexyr = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Gyakku\\gecuoh.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1792 set thread context of 2256 1792 rundll32.exe 31 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2256 msiexec.exe Token: SeSecurityPrivilege 2256 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1792 1996 rundll32.exe 28 PID 1996 wrote to memory of 1792 1996 rundll32.exe 28 PID 1996 wrote to memory of 1792 1996 rundll32.exe 28 PID 1996 wrote to memory of 1792 1996 rundll32.exe 28 PID 1996 wrote to memory of 1792 1996 rundll32.exe 28 PID 1996 wrote to memory of 1792 1996 rundll32.exe 28 PID 1996 wrote to memory of 1792 1996 rundll32.exe 28 PID 1792 wrote to memory of 2256 1792 rundll32.exe 31 PID 1792 wrote to memory of 2256 1792 rundll32.exe 31 PID 1792 wrote to memory of 2256 1792 rundll32.exe 31 PID 1792 wrote to memory of 2256 1792 rundll32.exe 31 PID 1792 wrote to memory of 2256 1792 rundll32.exe 31 PID 1792 wrote to memory of 2256 1792 rundll32.exe 31 PID 1792 wrote to memory of 2256 1792 rundll32.exe 31 PID 1792 wrote to memory of 2256 1792 rundll32.exe 31 PID 1792 wrote to memory of 2256 1792 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zte(1).dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zte(1).dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-