Analysis
-
max time kernel
109s -
max time network
110s -
platform
windows10_x64 -
resource
win10 -
submitted
09/07/2020, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
sample.bin.dll
Resource
win7v200430
0 signatures
0 seconds
General
-
Target
sample.bin.dll
-
Size
360KB
-
MD5
51e92b188d28211c9d6930ee232c311b
-
SHA1
f152329df180bc65ea479502346d649b973449bc
-
SHA256
b715ce2fa69bc8384df1a4137b50bc30e05c0f3f557fe8608635744543b9976d
-
SHA512
c0d66f831fadb76c3bf197731b58cfa535ec2d658bd3af47024b16b2986b0433ef554be37370c31eeffe06e557d17464c36271d67241018ae76fe68d4281a694
Malware Config
Extracted
Family
zloader
Botnet
nut
Campaign
08/07
C2
https://rdaprint.in/wp-parsing.php
https://vishweshwarastrology.com/wp-parsing.php
https://statpasapipag.tk/wp-parsing.php
https://www.netinup.it/wp-parsing.php
https://www.oneolimpio.tech/wp-parsing.php
https://hanskingrypgirigolf.ml/wp-parsing.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3904 created 2988 3904 rundll32.exe 56 -
Blacklisted process makes network request 11 IoCs
flow pid Process 8 424 msiexec.exe 10 424 msiexec.exe 11 424 msiexec.exe 12 424 msiexec.exe 13 424 msiexec.exe 14 424 msiexec.exe 15 424 msiexec.exe 17 424 msiexec.exe 19 424 msiexec.exe 21 424 msiexec.exe 23 424 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3904 set thread context of 424 3904 rundll32.exe 74 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3904 rundll32.exe 3904 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3904 rundll32.exe Token: SeSecurityPrivilege 424 msiexec.exe Token: SeSecurityPrivilege 424 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3920 wrote to memory of 3904 3920 rundll32.exe 67 PID 3920 wrote to memory of 3904 3920 rundll32.exe 67 PID 3920 wrote to memory of 3904 3920 rundll32.exe 67 PID 3904 wrote to memory of 424 3904 rundll32.exe 74 PID 3904 wrote to memory of 424 3904 rundll32.exe 74 PID 3904 wrote to memory of 424 3904 rundll32.exe 74 PID 3904 wrote to memory of 424 3904 rundll32.exe 74 PID 3904 wrote to memory of 424 3904 rundll32.exe 74
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2988
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\sample.bin.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\sample.bin.dll,#13⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blacklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:424
-