Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
31-10-2020 10:26
Static task
static1
Behavioral task
behavioral1
Sample
april17.dll
Resource
win7v20201028
General
-
Target
april17.dll
-
Size
446KB
-
MD5
cd39fa1ea4f0c4c9c2dd8492ff597250
-
SHA1
8bae4934e78c738ed60f631bc67db34604d35818
-
SHA256
372bae872e2a2180f04ff14f8fb9f769d733cb4608d37e2bf6e61fee5d396018
-
SHA512
a0d3d131f1be227c6617fdea3a79c0c07427fa855273534951cd6da87d49a7fabf636ae4e109541e680536920fb2a4cfc48b961ff10e2ad13e81adb396dc1371
Malware Config
Extracted
zloader
apr17
spam
http://wmwifbajxxbcxmucxmlc.com/post.php
http://ojnxjgfjlftfkkuxxiqd.com/post.php
http://pwkqhdgytsshkoibaake.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fyratyubvflktyyjiqgq.com/post.php
Signatures
-
Blacklisted process makes network request 1 IoCs
flow pid Process 21 1328 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3308 set thread context of 1328 3308 rundll32.exe 79 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1328 msiexec.exe Token: SeSecurityPrivilege 1328 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2260 wrote to memory of 3308 2260 rundll32.exe 69 PID 2260 wrote to memory of 3308 2260 rundll32.exe 69 PID 2260 wrote to memory of 3308 2260 rundll32.exe 69 PID 3308 wrote to memory of 1328 3308 rundll32.exe 79 PID 3308 wrote to memory of 1328 3308 rundll32.exe 79 PID 3308 wrote to memory of 1328 3308 rundll32.exe 79 PID 3308 wrote to memory of 1328 3308 rundll32.exe 79 PID 3308 wrote to memory of 1328 3308 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\april17.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\april17.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blacklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-