Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 19:51

General

  • Target

    s.dll

  • Size

    1.0MB

  • MD5

    ff1ad63517df53adaefcbeecf71311a1

  • SHA1

    69e3f9bbbf147d317da8bd59de3cdb3ca9043c6d

  • SHA256

    6593fa326b8eb0b737a17889c50c539ac45f2f9215fdab50ffa62df1be7ec2d1

  • SHA512

    f6de532a3fdb91dcfacd11442f80876037f4d6d0a382ac891ef0b03e5131596b7d3554d04d55d0d4f71a8990b2298da7bd344804f422e7cb909a981f83e7bc52

Malware Config

Extracted

Family

zloader

Botnet

miguel

Campaign

14/05

C2

https://kickapoochiefsfootball.com/wp-parser.php

https://appsbispo.tk/wp-parser.php

http://staging4.allemny.net/wp-parser.php

https://dinghaomcc.com/wp-parser.php

https://bondarenkopjatk.ru/wp-parser.php

http://euromix.com.ua/wp-parser.php

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Blacklisted process makes network request 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\s.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\s.dll
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Blacklisted process makes network request
        • Suspicious use of AdjustPrivilegeToken
        PID:536

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/536-2-0x00000000000D0000-0x00000000000D1000-memory.dmp
    Filesize

    4KB

  • memory/536-1-0x0000000000090000-0x00000000000C5000-memory.dmp
    Filesize

    212KB

  • memory/536-4-0x0000000000000000-mapping.dmp
  • memory/536-3-0x0000000000090000-0x00000000000C5000-memory.dmp
    Filesize

    212KB

  • memory/1052-5-0x000007FEF6380000-0x000007FEF65FA000-memory.dmp
    Filesize

    2.5MB

  • memory/1332-0-0x0000000000000000-mapping.dmp