Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:37
Static task
static1
Behavioral task
behavioral1
Sample
w.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
w.dll
-
Size
492KB
-
MD5
892fbc87fdbcbe9d91e17ae7355eb54c
-
SHA1
c0e25d2f02a768def644be6c248732da4f91495b
-
SHA256
67b46301815d5ba32f90af114a459810902ba6d97a75821c8455b8103073b499
-
SHA512
09c30eef3c57be57ef396ff1c2de92f0cff1b57bea0e56ab6401b844b4c5982c7a56f3ef708d0aff2bb6ea1baaef5cf39098b6623bc529c579b35ad73ea4039a
Malware Config
Extracted
Family
zloader
Botnet
miguel
Campaign
05/06
C2
https://gahotimaskever.ga/wp-parser.php
https://tlenexicagopca.tk/wp-parser.php
http://cld.kazgau.com/wp-parser.php
https://cmso.med.cmu.ac.th/wp-parser.php
http://janekleeb.com/wp-parser.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Blacklisted process makes network request 13 IoCs
Processes:
msiexec.exeflow pid process 8 1596 msiexec.exe 9 1596 msiexec.exe 10 1596 msiexec.exe 11 1596 msiexec.exe 12 1596 msiexec.exe 13 1596 msiexec.exe 15 1596 msiexec.exe 16 1596 msiexec.exe 17 1596 msiexec.exe 18 1596 msiexec.exe 19 1596 msiexec.exe 20 1596 msiexec.exe 22 1596 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2028 set thread context of 1596 2028 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1596 msiexec.exe Token: SeSecurityPrivilege 1596 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1056 wrote to memory of 2028 1056 rundll32.exe rundll32.exe PID 1056 wrote to memory of 2028 1056 rundll32.exe rundll32.exe PID 1056 wrote to memory of 2028 1056 rundll32.exe rundll32.exe PID 1056 wrote to memory of 2028 1056 rundll32.exe rundll32.exe PID 1056 wrote to memory of 2028 1056 rundll32.exe rundll32.exe PID 1056 wrote to memory of 2028 1056 rundll32.exe rundll32.exe PID 1056 wrote to memory of 2028 1056 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1596 2028 rundll32.exe msiexec.exe PID 2028 wrote to memory of 1596 2028 rundll32.exe msiexec.exe PID 2028 wrote to memory of 1596 2028 rundll32.exe msiexec.exe PID 2028 wrote to memory of 1596 2028 rundll32.exe msiexec.exe PID 2028 wrote to memory of 1596 2028 rundll32.exe msiexec.exe PID 2028 wrote to memory of 1596 2028 rundll32.exe msiexec.exe PID 2028 wrote to memory of 1596 2028 rundll32.exe msiexec.exe PID 2028 wrote to memory of 1596 2028 rundll32.exe msiexec.exe PID 2028 wrote to memory of 1596 2028 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\w.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\w.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blacklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1596-2-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/1596-1-0x0000000000090000-0x00000000000BB000-memory.dmpFilesize
172KB
-
memory/1596-3-0x0000000000090000-0x00000000000BB000-memory.dmpFilesize
172KB
-
memory/1596-4-0x0000000000000000-mapping.dmp
-
memory/1808-5-0x000007FEF6930000-0x000007FEF6BAA000-memory.dmpFilesize
2.5MB
-
memory/2028-0-0x0000000000000000-mapping.dmp