Analysis
-
max time kernel
129s -
max time network
143s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:32
Static task
static1
Behavioral task
behavioral1
Sample
yn.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
yn.dll
-
Size
404KB
-
MD5
a3d9b510e2e17f4ea08aa9f74b54e6b5
-
SHA1
78f875eabdca337c3526e52ba324902e7a148ce6
-
SHA256
a5e798492ba6892a57c79c635679563eceacb6d1efcc38f5dfc0232518861ca8
-
SHA512
271db785f09d03f33c1931d2482c12ec3a7239125f433caab8c2257c29d7fbd702d9daf1f82c7b5654025a22ee223d92c4140082528ace0412c1b656f0d919c4
Malware Config
Extracted
Family
zloader
Botnet
miguel
Campaign
03/06
C2
https://ticlatchmisrato.tk/wp-parser.php
https://gahotimaskever.ga/wp-parser.php
http://cld.kazgau.com/wp-parser.php
https://cmso.med.cmu.ac.th/wp-parser.php
http://veamor.net/wp-parser.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Blacklisted process makes network request 13 IoCs
Processes:
msiexec.exeflow pid process 6 1596 msiexec.exe 7 1596 msiexec.exe 8 1596 msiexec.exe 9 1596 msiexec.exe 10 1596 msiexec.exe 11 1596 msiexec.exe 13 1596 msiexec.exe 14 1596 msiexec.exe 15 1596 msiexec.exe 16 1596 msiexec.exe 17 1596 msiexec.exe 18 1596 msiexec.exe 20 1596 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2012 set thread context of 1596 2012 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1596 msiexec.exe Token: SeSecurityPrivilege 1596 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1584 wrote to memory of 2012 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 2012 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 2012 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 2012 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 2012 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 2012 1584 rundll32.exe rundll32.exe PID 1584 wrote to memory of 2012 1584 rundll32.exe rundll32.exe PID 2012 wrote to memory of 1596 2012 rundll32.exe msiexec.exe PID 2012 wrote to memory of 1596 2012 rundll32.exe msiexec.exe PID 2012 wrote to memory of 1596 2012 rundll32.exe msiexec.exe PID 2012 wrote to memory of 1596 2012 rundll32.exe msiexec.exe PID 2012 wrote to memory of 1596 2012 rundll32.exe msiexec.exe PID 2012 wrote to memory of 1596 2012 rundll32.exe msiexec.exe PID 2012 wrote to memory of 1596 2012 rundll32.exe msiexec.exe PID 2012 wrote to memory of 1596 2012 rundll32.exe msiexec.exe PID 2012 wrote to memory of 1596 2012 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\yn.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\yn.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blacklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1060-5-0x000007FEF7F70000-0x000007FEF81EA000-memory.dmpFilesize
2.5MB
-
memory/1596-2-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/1596-1-0x00000000000D0000-0x00000000000FB000-memory.dmpFilesize
172KB
-
memory/1596-3-0x00000000000D0000-0x00000000000FB000-memory.dmpFilesize
172KB
-
memory/1596-4-0x0000000000000000-mapping.dmp
-
memory/2012-0-0x0000000000000000-mapping.dmp