Analysis
-
max time kernel
121s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 06:47
Behavioral task
behavioral1
Sample
f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc.dll
-
Size
187KB
-
MD5
561d814286baee1b2e815c06e39d6e4e
-
SHA1
12defd78c0cd18d77a5ee085684e6e3c26ed42e9
-
SHA256
f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc
-
SHA512
01aa8a343625339321e55b5264a1f7f5c15309eccaaf78964e4e6a37c70416c35f64e874afbbaa5e8481c6687cee7fde3382404a24d920711707b8a5359e420b
Malware Config
Extracted
Family
zloader
Botnet
09/04
C2
https://eoieowo.casa/wp-config.php
https://dcgljuzrb.pw/wp-config.php
rc4.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1340 set thread context of 1612 1340 regsvr32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1612 msiexec.exe Token: SeSecurityPrivilege 1612 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1900 wrote to memory of 1340 1900 regsvr32.exe regsvr32.exe PID 1900 wrote to memory of 1340 1900 regsvr32.exe regsvr32.exe PID 1900 wrote to memory of 1340 1900 regsvr32.exe regsvr32.exe PID 1900 wrote to memory of 1340 1900 regsvr32.exe regsvr32.exe PID 1900 wrote to memory of 1340 1900 regsvr32.exe regsvr32.exe PID 1900 wrote to memory of 1340 1900 regsvr32.exe regsvr32.exe PID 1900 wrote to memory of 1340 1900 regsvr32.exe regsvr32.exe PID 1340 wrote to memory of 1612 1340 regsvr32.exe msiexec.exe PID 1340 wrote to memory of 1612 1340 regsvr32.exe msiexec.exe PID 1340 wrote to memory of 1612 1340 regsvr32.exe msiexec.exe PID 1340 wrote to memory of 1612 1340 regsvr32.exe msiexec.exe PID 1340 wrote to memory of 1612 1340 regsvr32.exe msiexec.exe PID 1340 wrote to memory of 1612 1340 regsvr32.exe msiexec.exe PID 1340 wrote to memory of 1612 1340 regsvr32.exe msiexec.exe PID 1340 wrote to memory of 1612 1340 regsvr32.exe msiexec.exe PID 1340 wrote to memory of 1612 1340 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1340-0-0x0000000000000000-mapping.dmp
-
memory/1612-1-0x0000000000100000-0x0000000000134000-memory.dmpFilesize
208KB
-
memory/1612-2-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/1612-3-0x0000000000100000-0x0000000000134000-memory.dmpFilesize
208KB
-
memory/1612-4-0x0000000000000000-mapping.dmp