Resubmissions

10-08-2023 17:12

230810-vq913aff23 10

10-08-2023 16:29

230810-tznnragg4y 10

09-11-2020 20:57

201109-4wpwk1zk1e 10

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 20:57

General

  • Target

    zte(1).dll

  • Size

    473KB

  • MD5

    2b99305fdd451f60f935efb4fd4fb9be

  • SHA1

    d0c7f705d3d94ccea33654f940c7b2e77448fc3d

  • SHA256

    8761a16b210e215456f4ad4dffeb624ee2b2b3646971860dc5ffb0f8b82658b0

  • SHA512

    7fb8307f9a669fd1ba37a41d4f611d61124370b514fa290fd0d9ad1dcba8f2c0a37e3999ee507944f03d66ac3907ba56bf3fbaaef5409e5ae5e7746f6d7bca0f

Malware Config

Extracted

Family

zloader

Botnet

bot5

Campaign

bot5

C2

https://militanttra.at/owg.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\zte(1).dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\zte(1).dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2672-1-0x0000000000A80000-0x0000000000AAB000-memory.dmp

    Filesize

    172KB