Analysis
-
max time kernel
298s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
cYNhXOc.dll
Resource
win7-20240729-en
General
-
Target
cYNhXOc.dll
-
Size
508KB
-
MD5
7bebb1b85a609733df0b3205406723bb
-
SHA1
384f07648c732cd9490b7d3bff41ce5a0911b138
-
SHA256
02846dbf25b333625a0720075fb47da62a946e5b0b4f9e9ba14cef514d576b37
-
SHA512
4147af9ed60d340218deb382374a015a3bb4cc4abc585e833e1a81ba21bf05f485e2a4cfc7b99223e9015ccda993c5ff19693ce7c00fb18701e66cd259422865
-
SSDEEP
6144:pThNEjn8Y+DbK916qEs+9RE3ZiK8jhUIBJawdcM+G7z7oqlpQYkYXlcYS:Zbg8Y+Db7qEs+MJZChUIBMvZA1kGd
Malware Config
Extracted
zloader
july28
july28
https://vlcafxbdjtlvlcduwhga.com/web/post.php
https://softwareserviceupdater3.com/web/post.php
https://softwareserviceupdater4.com/web/post.php
-
build_id
20
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid Process procid_target PID 1488 created 1200 1488 regsvr32.exe 21 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid Process procid_target PID 1488 set thread context of 2180 1488 regsvr32.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exemsiexec.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
regsvr32.exepid Process 1488 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
regsvr32.exemsiexec.exedescription pid Process Token: SeDebugPrivilege 1488 regsvr32.exe Token: SeSecurityPrivilege 2180 msiexec.exe Token: SeSecurityPrivilege 2180 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid Process procid_target PID 1376 wrote to memory of 1488 1376 regsvr32.exe 31 PID 1376 wrote to memory of 1488 1376 regsvr32.exe 31 PID 1376 wrote to memory of 1488 1376 regsvr32.exe 31 PID 1376 wrote to memory of 1488 1376 regsvr32.exe 31 PID 1376 wrote to memory of 1488 1376 regsvr32.exe 31 PID 1376 wrote to memory of 1488 1376 regsvr32.exe 31 PID 1376 wrote to memory of 1488 1376 regsvr32.exe 31 PID 1488 wrote to memory of 2180 1488 regsvr32.exe 32 PID 1488 wrote to memory of 2180 1488 regsvr32.exe 32 PID 1488 wrote to memory of 2180 1488 regsvr32.exe 32 PID 1488 wrote to memory of 2180 1488 regsvr32.exe 32 PID 1488 wrote to memory of 2180 1488 regsvr32.exe 32 PID 1488 wrote to memory of 2180 1488 regsvr32.exe 32 PID 1488 wrote to memory of 2180 1488 regsvr32.exe 32 PID 1488 wrote to memory of 2180 1488 regsvr32.exe 32 PID 1488 wrote to memory of 2180 1488 regsvr32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\cYNhXOc.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\cYNhXOc.dll3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2180
-