Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
25/07/2020, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
july22.dll
Resource
win7
0 signatures
0 seconds
General
-
Target
july22.dll
-
Size
395KB
-
MD5
94fa4ef5c63b688a2813e95138198cb4
-
SHA1
24695fee9af688864a789b0415c19918870fdff5
-
SHA256
c1532b3d37ff2ec7d70d7f8037b8cdf843d3cdd24adf860f4251d045ddf9d47c
-
SHA512
e3d83795765e9e1f6c87f33494894260956b86fc7d8455c7ac0eb23c3f4d9c227c6e0358745eba7a87e9ff367d9a19adc257c75c59278d0f968f94eb408bf85c
Malware Config
Extracted
Family
zloader
Botnet
July20SSL
Campaign
July20SSL
C2
https://vlcafxbdjtlvlcduwhga.com/web/post.php
https://softwareserviceupdater3.com/web/post.php
https://softwareserviceupdater4.com/web/post.php
2b4@jfhu#sd43fd!42d
rc4.plain
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1468 wrote to memory of 3920 1468 rundll32.exe 66 PID 1468 wrote to memory of 3920 1468 rundll32.exe 66 PID 1468 wrote to memory of 3920 1468 rundll32.exe 66 PID 3920 wrote to memory of 2608 3920 rundll32.exe 73 PID 3920 wrote to memory of 2608 3920 rundll32.exe 73 PID 3920 wrote to memory of 2608 3920 rundll32.exe 73 PID 3920 wrote to memory of 2608 3920 rundll32.exe 73 PID 3920 wrote to memory of 2608 3920 rundll32.exe 73 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3920 rundll32.exe Token: SeSecurityPrivilege 2608 msiexec.exe Token: SeSecurityPrivilege 2608 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3920 rundll32.exe 3920 rundll32.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3920 created 2812 3920 rundll32.exe 56 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3920 set thread context of 2608 3920 rundll32.exe 73 -
Blacklisted process makes network request 3 IoCs
flow pid Process 13 2608 msiexec.exe 15 2608 msiexec.exe 17 2608 msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2812
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\july22.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\july22.dll,#13⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:3920
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Blacklisted process makes network request
PID:2608
-