Analysis
-
max time kernel
1157s -
max time network
1163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 11:10
Behavioral task
behavioral1
Sample
023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe
Resource
win7-20231023-en
General
-
Target
023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe
-
Size
2.6MB
-
MD5
fb95561e8ed7289d015e945ad470e6db
-
SHA1
03573bc869701cffd7c96e223633d46b0a23823a
-
SHA256
023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82
-
SHA512
2a0bf4048c1a9eca9e13566b1512403b51462c8eb71cfb273225fbc221aa156a3d3eb571fa5328ff2f4e2ef7026b3e8847f0c0a739d8f989ba716efa411821a6
-
SSDEEP
6144:sTlCgffOYPE99pqcLE9zn0HJGsfb7cwhl7e/:sJfWP9p1Lgzmbgye/
Malware Config
Extracted
zloader
pref
fpref
http://penaz.info/gate.php
http:// advokat-hodonin.info/gate.php
-
build_id
7
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zyxiykxe = "C:\\Users\\Admin\\AppData\\Roaming\\Qemuun\\yzheri.exe" msiexec.exe -
Blocklisted process makes network request 47 IoCs
Processes:
msiexec.exeflow pid process 462 4336 msiexec.exe 463 4336 msiexec.exe 465 4336 msiexec.exe 467 4336 msiexec.exe 471 4336 msiexec.exe 472 4336 msiexec.exe 473 4336 msiexec.exe 475 4336 msiexec.exe 476 4336 msiexec.exe 477 4336 msiexec.exe 478 4336 msiexec.exe 479 4336 msiexec.exe 480 4336 msiexec.exe 481 4336 msiexec.exe 482 4336 msiexec.exe 487 4336 msiexec.exe 488 4336 msiexec.exe 489 4336 msiexec.exe 490 4336 msiexec.exe 491 4336 msiexec.exe 492 4336 msiexec.exe 493 4336 msiexec.exe 494 4336 msiexec.exe 495 4336 msiexec.exe 496 4336 msiexec.exe 497 4336 msiexec.exe 498 4336 msiexec.exe 502 4336 msiexec.exe 503 4336 msiexec.exe 504 4336 msiexec.exe 505 4336 msiexec.exe 506 4336 msiexec.exe 507 4336 msiexec.exe 508 4336 msiexec.exe 509 4336 msiexec.exe 510 4336 msiexec.exe 511 4336 msiexec.exe 512 4336 msiexec.exe 513 4336 msiexec.exe 521 4336 msiexec.exe 522 4336 msiexec.exe 524 4336 msiexec.exe 525 4336 msiexec.exe 526 4336 msiexec.exe 527 4336 msiexec.exe 529 4336 msiexec.exe 531 4336 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exedescription pid process target process PID 864 set thread context of 4336 864 023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
msiexec.exesvchost.exedescription pid process Token: SeSecurityPrivilege 4336 msiexec.exe Token: SeSecurityPrivilege 4336 msiexec.exe Token: SeManageVolumePrivilege 1656 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exedescription pid process target process PID 864 wrote to memory of 4336 864 023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe msiexec.exe PID 864 wrote to memory of 4336 864 023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe msiexec.exe PID 864 wrote to memory of 4336 864 023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe msiexec.exe PID 864 wrote to memory of 4336 864 023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe msiexec.exe PID 864 wrote to memory of 4336 864 023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe"C:\Users\Admin\AppData\Local\Temp\023f1ef0cc2c1e055b05ae1ff5bcc6bf2421003dea227aeb6d70c8a525fa3b82.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Adds Run key to start application
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2628
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5c228ca3dafb1bf77b28cc1f095c02d11
SHA1e50917ef6f7917986b25607e56f07b77bbcb2db4
SHA256246d8d86cad33ccfac2848b9bbd40d19dd5b4300abefc5c5580b82a27b212d8f
SHA5124c9cb111bb7e548277f4589dde28915a1fb7c14dd000eefdcbb46f8d28b77870a30c86d65103e9ec6c3ff3ddc4661ecd9522bf7a9b97b31030f8a5359bf5a089