Analysis
-
max time kernel
137s -
max time network
52s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
12-08-2020 18:03
Static task
static1
Behavioral task
behavioral1
Sample
yfuvqe.dll
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
yfuvqe.dll
-
Size
389KB
-
MD5
93c0cd9a47c5c28335e773c1f451f200
-
SHA1
0c53b71e52a382f2a920df2d80048b01616c62c4
-
SHA256
deac9f705c6ddd2795f31b9d55ace3f3de1e20de314b0c20f1a2e90fdf259cb2
-
SHA512
cf6ae7d6b2ecbb3cbfbd99c067dd7b7b94572991aee00d00fb423acce9edd234a8662e00943873dcbf0931115871356ab57191f8be3b9041a779ce2b02a39223
Malware Config
Extracted
Family
zloader
Botnet
mk1
Campaign
mac2
C2
https://alesirovone.world/click.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 724 created 3068 724 rundll32.exe Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 724 set thread context of 3556 724 rundll32.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 724 rundll32.exe 724 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
rundll32.exemsiexec.exedescription pid process Token: SeDebugPrivilege 724 rundll32.exe Token: SeSecurityPrivilege 3556 msiexec.exe Token: SeSecurityPrivilege 3556 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 648 wrote to memory of 724 648 rundll32.exe rundll32.exe PID 648 wrote to memory of 724 648 rundll32.exe rundll32.exe PID 648 wrote to memory of 724 648 rundll32.exe rundll32.exe PID 724 wrote to memory of 3556 724 rundll32.exe msiexec.exe PID 724 wrote to memory of 3556 724 rundll32.exe msiexec.exe PID 724 wrote to memory of 3556 724 rundll32.exe msiexec.exe PID 724 wrote to memory of 3556 724 rundll32.exe msiexec.exe PID 724 wrote to memory of 3556 724 rundll32.exe msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3068
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\yfuvqe.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\yfuvqe.dll,#13⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:724
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3556
-