Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 02:56
Behavioral task
behavioral1
Sample
0889271c721391d625a19391275f0e6bf244a5548a1a6eb673c6e16a48e960e1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0889271c721391d625a19391275f0e6bf244a5548a1a6eb673c6e16a48e960e1.dll
Resource
win10v2004-20241007-en
General
-
Target
0889271c721391d625a19391275f0e6bf244a5548a1a6eb673c6e16a48e960e1.dll
-
Size
170KB
-
MD5
7339d426a3968dbfcd9f1f6043f2d91f
-
SHA1
af40aa784ab77899200410ea45809cac3db909a0
-
SHA256
0889271c721391d625a19391275f0e6bf244a5548a1a6eb673c6e16a48e960e1
-
SHA512
04ec77928e5a4b62bf75a4613ba105e43a2a58458cb8d07a32055014987b14f0c8b5e72d48ca664c5efbc34270b549a9ca08e7b36487a6c574feacc920b83bfa
-
SSDEEP
3072:CM6/5WHoRkeQilLJWs+XSpo66ftDdgf6Q7e7Ca4vR1ECBLMK9pb6r9BhMTvPhbQn:kYHriRJeeo6st9Ae7HI1iKHUnudrW
Malware Config
Extracted
zloader
10/03
https://dhteijwrb.host/milagrecf.php
https://aquolepp.pw/milagrecf.php
-
build_id
83
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lauq = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Riev\\ycbo.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2716 set thread context of 2836 2716 regsvr32.exe msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exemsiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 2836 msiexec.exe Token: SeSecurityPrivilege 2836 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2824 wrote to memory of 2716 2824 regsvr32.exe regsvr32.exe PID 2824 wrote to memory of 2716 2824 regsvr32.exe regsvr32.exe PID 2824 wrote to memory of 2716 2824 regsvr32.exe regsvr32.exe PID 2824 wrote to memory of 2716 2824 regsvr32.exe regsvr32.exe PID 2824 wrote to memory of 2716 2824 regsvr32.exe regsvr32.exe PID 2824 wrote to memory of 2716 2824 regsvr32.exe regsvr32.exe PID 2824 wrote to memory of 2716 2824 regsvr32.exe regsvr32.exe PID 2716 wrote to memory of 2836 2716 regsvr32.exe msiexec.exe PID 2716 wrote to memory of 2836 2716 regsvr32.exe msiexec.exe PID 2716 wrote to memory of 2836 2716 regsvr32.exe msiexec.exe PID 2716 wrote to memory of 2836 2716 regsvr32.exe msiexec.exe PID 2716 wrote to memory of 2836 2716 regsvr32.exe msiexec.exe PID 2716 wrote to memory of 2836 2716 regsvr32.exe msiexec.exe PID 2716 wrote to memory of 2836 2716 regsvr32.exe msiexec.exe PID 2716 wrote to memory of 2836 2716 regsvr32.exe msiexec.exe PID 2716 wrote to memory of 2836 2716 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0889271c721391d625a19391275f0e6bf244a5548a1a6eb673c6e16a48e960e1.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0889271c721391d625a19391275f0e6bf244a5548a1a6eb673c6e16a48e960e1.dll2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-