Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7 -
submitted
25/07/2020, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
july22.dll
Resource
win7
0 signatures
0 seconds
General
-
Target
july22.dll
-
Size
395KB
-
MD5
94fa4ef5c63b688a2813e95138198cb4
-
SHA1
24695fee9af688864a789b0415c19918870fdff5
-
SHA256
c1532b3d37ff2ec7d70d7f8037b8cdf843d3cdd24adf860f4251d045ddf9d47c
-
SHA512
e3d83795765e9e1f6c87f33494894260956b86fc7d8455c7ac0eb23c3f4d9c227c6e0358745eba7a87e9ff367d9a19adc257c75c59278d0f968f94eb408bf85c
Malware Config
Extracted
Family
zloader
Botnet
July20SSL
Campaign
July20SSL
C2
https://vlcafxbdjtlvlcduwhga.com/web/post.php
https://softwareserviceupdater3.com/web/post.php
https://softwareserviceupdater4.com/web/post.php
2b4@jfhu#sd43fd!42d
rc4.plain
Signatures
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 900 wrote to memory of 836 900 rundll32.exe 24 PID 900 wrote to memory of 836 900 rundll32.exe 24 PID 900 wrote to memory of 836 900 rundll32.exe 24 PID 900 wrote to memory of 836 900 rundll32.exe 24 PID 900 wrote to memory of 836 900 rundll32.exe 24 PID 900 wrote to memory of 836 900 rundll32.exe 24 PID 900 wrote to memory of 836 900 rundll32.exe 24 PID 836 wrote to memory of 1844 836 rundll32.exe 27 PID 836 wrote to memory of 1844 836 rundll32.exe 27 PID 836 wrote to memory of 1844 836 rundll32.exe 27 PID 836 wrote to memory of 1844 836 rundll32.exe 27 PID 836 wrote to memory of 1844 836 rundll32.exe 27 PID 836 wrote to memory of 1844 836 rundll32.exe 27 PID 836 wrote to memory of 1844 836 rundll32.exe 27 PID 836 wrote to memory of 1844 836 rundll32.exe 27 PID 836 wrote to memory of 1844 836 rundll32.exe 27 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 836 rundll32.exe Token: SeSecurityPrivilege 1844 msiexec.exe Token: SeSecurityPrivilege 1844 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 836 rundll32.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 836 created 1292 836 rundll32.exe 20 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 836 set thread context of 1844 836 rundll32.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1292
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\july22.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\july22.dll,#13⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:836
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1844
-