Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd.dll
Resource
win7-20240708-en
General
-
Target
acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd.dll
-
Size
764KB
-
MD5
ebc6187124521528375d17372a16ae94
-
SHA1
1aee7da350e939d1686cd52c258f05270e63f990
-
SHA256
acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd
-
SHA512
6e8f3dbc3a3121c00b6574558be8acc3331e7a8b7ca6aa2ae354d9d6ae62a69ffc3541f40b16cd0fb5364dd9f4ec430639a1ffaec987fa2d4dfd0850930f56f5
-
SSDEEP
12288:hnRMkNXTsN/ReZfzXizT4w59FYayoqtlZ/e:hRMklbfzXizT4aF9Atl
Malware Config
Extracted
zloader
17/03
https://dhteijwrb.host/milagrecf.php
https://aquolepp.pw/milagrecf.php
-
build_id
92
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ufhu = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Toixpi\\arluo.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 2812 2040 rundll32.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2812 msiexec.exe Token: SeSecurityPrivilege 2812 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 1952 wrote to memory of 2040 1952 rundll32.exe 30 PID 2040 wrote to memory of 2812 2040 rundll32.exe 32 PID 2040 wrote to memory of 2812 2040 rundll32.exe 32 PID 2040 wrote to memory of 2812 2040 rundll32.exe 32 PID 2040 wrote to memory of 2812 2040 rundll32.exe 32 PID 2040 wrote to memory of 2812 2040 rundll32.exe 32 PID 2040 wrote to memory of 2812 2040 rundll32.exe 32 PID 2040 wrote to memory of 2812 2040 rundll32.exe 32 PID 2040 wrote to memory of 2812 2040 rundll32.exe 32 PID 2040 wrote to memory of 2812 2040 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-