Resubmissions

31-10-2020 17:30

201031-3hg5q2lj72 10

31-10-2020 17:22

201031-8cwbaek9f6 10

31-10-2020 00:24

201031-y7l54dz7se 1

Analysis

  • max time kernel
    300s
  • max time network
    298s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    31-10-2020 17:22

General

  • Target

    kFQR.dll

  • Size

    277KB

  • MD5

    fd0a2b6c6203e4b56d8c73f6323d5d68

  • SHA1

    e87f8d9f7e768f4169355ffda625a80f0e00decb

  • SHA256

    a4711adb921498e7c74af3fd05daaa525f261e7044d457e905dad66767e5b8b4

  • SHA512

    85bc1fd3fba441bbb67d6b75c3f058f2acec396299a012bc0c4ba5c1a5a105c712c54f258a58dc5ef2ef7789a58227d4ce99d14f53ceaf5c3cebdd44fe930c3a

Malware Config

Extracted

Family

zloader

Botnet

nut

Campaign

30/10

C2

https://creditoacumuladoicms.com.br/npnegt.php

https://morgadoent.co.za/fp3jsl.php

https://access-one.us/clkgmw.php

https://amazonuniverse.in/dgxcee.php

https://ntandingsundhosmala.tk/wp-smarts.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Blacklisted process makes network request 73 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Modifies service 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Discovers systems in the same network 1 TTPs 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 83 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\kFQR.dll,#1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\kFQR.dll,#1
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2024
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        2⤵
        • Blacklisted process makes network request
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ipconfig /all
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2016
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /all
            4⤵
            • Modifies service
            • Gathers network information
            PID:1324
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:756
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c net config workstation
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:984
          • C:\Windows\SysWOW64\net.exe
            net config workstation
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1264
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 config workstation
              5⤵
                PID:1232
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c net view /all
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1132
            • C:\Windows\SysWOW64\net.exe
              net view /all
              4⤵
              • Discovers systems in the same network
              PID:1664
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c net view /all /domain
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1900
            • C:\Windows\SysWOW64\net.exe
              net view /all /domain
              4⤵
              • Discovers systems in the same network
              PID:1396
          • C:\Users\Admin\AppData\Local\Temp\Fina\certutil.exe
            "C:\Users\Admin\AppData\Local\Temp\Fina\certutil.exe" -A -n "ezut" -t "C,C,C" -i "C:\Users\Admin\AppData\Local\Temp\isdery.crt" -d sql:"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jl56y3z6.default-release"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1700
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2036

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Command-Line Interface

      1
      T1059

      Persistence

      Modify Existing Service

      1
      T1031

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Remote System Discovery

      1
      T1018

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Fina\MSVCR100.dll
        MD5

        0e37fbfa79d349d672456923ec5fbbe3

        SHA1

        4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

        SHA256

        8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

        SHA512

        2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

      • C:\Users\Admin\AppData\Local\Temp\Fina\certutil.exe
        MD5

        0c6b43c9602f4d5ac9dcf907103447c4

        SHA1

        7a77c7ae99d400243845cce0e0931f029a73f79a

        SHA256

        5950722034c8505daa9b359127feb707f16c37d2f69e79d16ee6d9ec37690478

        SHA512

        b21b34a5886a3058ce26a6a5a6ead3b1ebae62354540492fb6508be869e7d292b351c0913461b47c4cc0c6a73333aad33cd9399bcb1f83c7dacfdb7f2ee1f7a9

      • C:\Users\Admin\AppData\Local\Temp\Fina\freebl3.dll
        MD5

        269beb631b580c6d54db45b5573b1de5

        SHA1

        64050c1159c2bcfc0e75da407ef0098ad2de17c8

        SHA256

        ffc7558a61a4e6546cf095bdeabea19f05247a0daa02dca20ea3605e7fc62c77

        SHA512

        649cd40f3e02c2f2711f56aa21f39ccbda9108143d4766a9728c9ad98f329d5f64f77090df769c55b66ab48fb9aa4a380944ebe54f2c450f96cf76e5a6add31e

      • C:\Users\Admin\AppData\Local\Temp\Fina\libnspr4.dll
        MD5

        6e84af2875700285309dd29294365c6a

        SHA1

        fc3cb3b2a704250fc36010e2ab495cdc5e7378a9

        SHA256

        1c158e680749e642e55f721f60a71314e26e03e785cd92e560bf650b83c4c3c8

        SHA512

        0add9479b2fd631bafc617c787bca331e915edc6a29dd72269b6a24490ec1c85e677698e07944f5ff3bd8d849d3d20ace61a194a044c697fefcf992c6f05e747

      • C:\Users\Admin\AppData\Local\Temp\Fina\libplc4.dll
        MD5

        1fae68b740f18290b98b2f9e23313cc2

        SHA1

        fa3545dc8db38b3b27f1009e1d61dc2949df3878

        SHA256

        751c2156dc00525668dd990d99f7f61c257951c3fad01c0ee6359fcdff69f933

        SHA512

        5386aad83c76c625e2d64439b2b25bda8d0f8b1eb9344b58306883b66675d1f1e98e3189c1bc29cd4b2c98a9d4a594761488aae04d3748bba5775a51425b11ec

      • C:\Users\Admin\AppData\Local\Temp\Fina\libplds4.dll
        MD5

        9ae76db13972553a5de5bdd07b1b654d

        SHA1

        0c4508eb6f13b9b178237ccc4da759bff10af658

        SHA256

        38a906373419501966daf6ec19ca2f8db7b29609128ae5cb424d2aa511652c29

        SHA512

        db6fd98a2b27dd7622f10491bba08793d26ab59016d6862168aad278644f737dddbd312a690ded5091d5e999dc3c3518fd95b200124be8349829e5ce6685cf4b

      • C:\Users\Admin\AppData\Local\Temp\Fina\nss3.dll
        MD5

        a1c4628d184b6ab25550b1ce74f44792

        SHA1

        c2c447fd2fda68c0ec44b3529a2550d2e2a8c3bc

        SHA256

        3f997d3f1674de9fd119f275638861bc229352f12c70536d8c83a70fcc370847

        SHA512

        07737ac24c91645d9b4d376327b84cb0b470cecbad60920d7ee0e9b11ef4eeb8ee68fb38bf74b5d1f8817d104cecc65e461950242d940e8ff9ca64ce9d3ffbb7

      • C:\Users\Admin\AppData\Local\Temp\Fina\nssutil3.dll
        MD5

        c26e940b474728e728cafe5912ba418a

        SHA1

        7256e378a419f8d87de71835e6ad12faadaaaf73

        SHA256

        1af1ac51a92b36de8d85d1f572369815404912908c3a489a6cd7ca2350c2a93d

        SHA512

        bd8673facd416c8f2eb9a45c4deef50e53d0bc41e6b3941fc20cda8e2d88267205526dadb44bd89869bd333bf7d6f8db589c95997e1f3322f7a66a09d562b1df

      • C:\Users\Admin\AppData\Local\Temp\Fina\smime3.dll
        MD5

        a5c670edf4411bf7f132f4280026137b

        SHA1

        c0e3cbdde7d3cebf41a193eeca96a11ce2b6da58

        SHA256

        aba2732c7a016730e94e645dd04e8fafcc173fc2e5e2aac01a1c0c66ead1983e

        SHA512

        acfcde89a968d81363ae1cd599a6a362b047ae207722fea8541577ac609bc5fefb2231ed946e13f0b4b3bcd56b947c13837c1b9e360d521ec7d580befcbb0f46

      • C:\Users\Admin\AppData\Local\Temp\Fina\softokn3.dll
        MD5

        2ab31c9401870adb4e9d88b5a6837abf

        SHA1

        4f0fdd699e63f614d79ed6e47ef61938117d3b7a

        SHA256

        22ecece561510f77b100cff8109e5ed492c34707b7b14e0774aaa9ca813de4ad

        SHA512

        bc58c4da15e902351f1f161e9d8c1ee4d10aceb5eda7def4b4454cadf4cd9f437118ba9d63f25f4f0a5694e9d34a4def33d40ad51efb1cdebb6f02a81c481871

      • C:\Users\Admin\AppData\Local\Temp\Fina\sqlite3.dll
        MD5

        b58848a28a1efb85677e344db1fd67e6

        SHA1

        dad48e2b2b3b936efc15ac2c5f9099b7a1749976

        SHA256

        00db98ab4d50e9b26ecd193bfad6569e1dd395db14246f8c233febba93965f7a

        SHA512

        762b3bd7f1f1a5c3accde8c36406b9beadd4270c570eb95a05935c1f7731513938ae5e99950c648b1eacdd2a85f002319b78b7e4ea9577c72335a2fa54796b13

      • C:\Users\Admin\AppData\Local\Temp\isdery.crt
        MD5

        c3a208986b47dc81e426cff5b26d599a

        SHA1

        8ea7683e76c961d69ce2c15d69379d63281e5c5a

        SHA256

        66c2bd94d34585d9cefa6b441d77692f65b879ac0bbfef8fb205caafd3c98e26

        SHA512

        34a210ac0155b598fbbfdfa88f6b81a4a4927d1bf0e5bfec0c835f58351ed45e4d6de345e72f593075e0ec6436884ed2812864be883d203ab5e6af1ecc088d18

      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jl56y3z6.default-release\cert9.db
        MD5

        f9883884d83dd1ec9c95250c08e0bc1e

        SHA1

        09a5d3db45c46308c31a9c2cbd5901629f06c711

        SHA256

        eda5fb72489c9a3a7fede59c188663d553fa39ef6f50c0f36ed477827acac067

        SHA512

        88a23b8379737ba4dbb559da8739fc1f54d3facb74ccda94c11e9b4017473f77a9418436038c394e43c9ab94e626b77063808b8cc8a339c4755b558806f44216

      • \Users\Admin\AppData\Local\Temp\Fina\certutil.exe
        MD5

        0c6b43c9602f4d5ac9dcf907103447c4

        SHA1

        7a77c7ae99d400243845cce0e0931f029a73f79a

        SHA256

        5950722034c8505daa9b359127feb707f16c37d2f69e79d16ee6d9ec37690478

        SHA512

        b21b34a5886a3058ce26a6a5a6ead3b1ebae62354540492fb6508be869e7d292b351c0913461b47c4cc0c6a73333aad33cd9399bcb1f83c7dacfdb7f2ee1f7a9

      • \Users\Admin\AppData\Local\Temp\Fina\certutil.exe
        MD5

        0c6b43c9602f4d5ac9dcf907103447c4

        SHA1

        7a77c7ae99d400243845cce0e0931f029a73f79a

        SHA256

        5950722034c8505daa9b359127feb707f16c37d2f69e79d16ee6d9ec37690478

        SHA512

        b21b34a5886a3058ce26a6a5a6ead3b1ebae62354540492fb6508be869e7d292b351c0913461b47c4cc0c6a73333aad33cd9399bcb1f83c7dacfdb7f2ee1f7a9

      • \Users\Admin\AppData\Local\Temp\Fina\freebl3.dll
        MD5

        269beb631b580c6d54db45b5573b1de5

        SHA1

        64050c1159c2bcfc0e75da407ef0098ad2de17c8

        SHA256

        ffc7558a61a4e6546cf095bdeabea19f05247a0daa02dca20ea3605e7fc62c77

        SHA512

        649cd40f3e02c2f2711f56aa21f39ccbda9108143d4766a9728c9ad98f329d5f64f77090df769c55b66ab48fb9aa4a380944ebe54f2c450f96cf76e5a6add31e

      • \Users\Admin\AppData\Local\Temp\Fina\libnspr4.dll
        MD5

        6e84af2875700285309dd29294365c6a

        SHA1

        fc3cb3b2a704250fc36010e2ab495cdc5e7378a9

        SHA256

        1c158e680749e642e55f721f60a71314e26e03e785cd92e560bf650b83c4c3c8

        SHA512

        0add9479b2fd631bafc617c787bca331e915edc6a29dd72269b6a24490ec1c85e677698e07944f5ff3bd8d849d3d20ace61a194a044c697fefcf992c6f05e747

      • \Users\Admin\AppData\Local\Temp\Fina\libplc4.dll
        MD5

        1fae68b740f18290b98b2f9e23313cc2

        SHA1

        fa3545dc8db38b3b27f1009e1d61dc2949df3878

        SHA256

        751c2156dc00525668dd990d99f7f61c257951c3fad01c0ee6359fcdff69f933

        SHA512

        5386aad83c76c625e2d64439b2b25bda8d0f8b1eb9344b58306883b66675d1f1e98e3189c1bc29cd4b2c98a9d4a594761488aae04d3748bba5775a51425b11ec

      • \Users\Admin\AppData\Local\Temp\Fina\libplds4.dll
        MD5

        9ae76db13972553a5de5bdd07b1b654d

        SHA1

        0c4508eb6f13b9b178237ccc4da759bff10af658

        SHA256

        38a906373419501966daf6ec19ca2f8db7b29609128ae5cb424d2aa511652c29

        SHA512

        db6fd98a2b27dd7622f10491bba08793d26ab59016d6862168aad278644f737dddbd312a690ded5091d5e999dc3c3518fd95b200124be8349829e5ce6685cf4b

      • \Users\Admin\AppData\Local\Temp\Fina\msvcr100.dll
        MD5

        0e37fbfa79d349d672456923ec5fbbe3

        SHA1

        4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

        SHA256

        8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

        SHA512

        2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

      • \Users\Admin\AppData\Local\Temp\Fina\nss3.dll
        MD5

        a1c4628d184b6ab25550b1ce74f44792

        SHA1

        c2c447fd2fda68c0ec44b3529a2550d2e2a8c3bc

        SHA256

        3f997d3f1674de9fd119f275638861bc229352f12c70536d8c83a70fcc370847

        SHA512

        07737ac24c91645d9b4d376327b84cb0b470cecbad60920d7ee0e9b11ef4eeb8ee68fb38bf74b5d1f8817d104cecc65e461950242d940e8ff9ca64ce9d3ffbb7

      • \Users\Admin\AppData\Local\Temp\Fina\nssutil3.dll
        MD5

        c26e940b474728e728cafe5912ba418a

        SHA1

        7256e378a419f8d87de71835e6ad12faadaaaf73

        SHA256

        1af1ac51a92b36de8d85d1f572369815404912908c3a489a6cd7ca2350c2a93d

        SHA512

        bd8673facd416c8f2eb9a45c4deef50e53d0bc41e6b3941fc20cda8e2d88267205526dadb44bd89869bd333bf7d6f8db589c95997e1f3322f7a66a09d562b1df

      • \Users\Admin\AppData\Local\Temp\Fina\smime3.dll
        MD5

        a5c670edf4411bf7f132f4280026137b

        SHA1

        c0e3cbdde7d3cebf41a193eeca96a11ce2b6da58

        SHA256

        aba2732c7a016730e94e645dd04e8fafcc173fc2e5e2aac01a1c0c66ead1983e

        SHA512

        acfcde89a968d81363ae1cd599a6a362b047ae207722fea8541577ac609bc5fefb2231ed946e13f0b4b3bcd56b947c13837c1b9e360d521ec7d580befcbb0f46

      • \Users\Admin\AppData\Local\Temp\Fina\softokn3.dll
        MD5

        2ab31c9401870adb4e9d88b5a6837abf

        SHA1

        4f0fdd699e63f614d79ed6e47ef61938117d3b7a

        SHA256

        22ecece561510f77b100cff8109e5ed492c34707b7b14e0774aaa9ca813de4ad

        SHA512

        bc58c4da15e902351f1f161e9d8c1ee4d10aceb5eda7def4b4454cadf4cd9f437118ba9d63f25f4f0a5694e9d34a4def33d40ad51efb1cdebb6f02a81c481871

      • \Users\Admin\AppData\Local\Temp\Fina\sqlite3.dll
        MD5

        b58848a28a1efb85677e344db1fd67e6

        SHA1

        dad48e2b2b3b936efc15ac2c5f9099b7a1749976

        SHA256

        00db98ab4d50e9b26ecd193bfad6569e1dd395db14246f8c233febba93965f7a

        SHA512

        762b3bd7f1f1a5c3accde8c36406b9beadd4270c570eb95a05935c1f7731513938ae5e99950c648b1eacdd2a85f002319b78b7e4ea9577c72335a2fa54796b13

      • memory/560-5-0x000007FEF6930000-0x000007FEF6BAA000-memory.dmp
        Filesize

        2.5MB

      • memory/756-6-0x0000000000000000-mapping.dmp
      • memory/984-9-0x0000000000000000-mapping.dmp
      • memory/1132-12-0x0000000000000000-mapping.dmp
      • memory/1232-11-0x0000000000000000-mapping.dmp
      • memory/1264-10-0x0000000000000000-mapping.dmp
      • memory/1324-8-0x0000000000000000-mapping.dmp
      • memory/1396-15-0x0000000000000000-mapping.dmp
      • memory/1664-13-0x0000000000000000-mapping.dmp
      • memory/1700-19-0x0000000000000000-mapping.dmp
      • memory/1744-4-0x0000000000000000-mapping.dmp
      • memory/1744-3-0x0000000000090000-0x00000000000B6000-memory.dmp
        Filesize

        152KB

      • memory/1744-2-0x00000000000C0000-0x00000000000C1000-memory.dmp
        Filesize

        4KB

      • memory/1744-16-0x0000000004180000-0x000000000435B000-memory.dmp
        Filesize

        1.9MB

      • memory/1744-1-0x0000000000090000-0x00000000000B6000-memory.dmp
        Filesize

        152KB

      • memory/1900-14-0x0000000000000000-mapping.dmp
      • memory/2016-7-0x0000000000000000-mapping.dmp
      • memory/2024-0-0x0000000000000000-mapping.dmp
      • memory/2036-43-0x0000000000000000-mapping.dmp