Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-11-2020 06:47
Behavioral task
behavioral1
Sample
f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc.dll
-
Size
187KB
-
MD5
561d814286baee1b2e815c06e39d6e4e
-
SHA1
12defd78c0cd18d77a5ee085684e6e3c26ed42e9
-
SHA256
f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc
-
SHA512
01aa8a343625339321e55b5264a1f7f5c15309eccaaf78964e4e6a37c70416c35f64e874afbbaa5e8481c6687cee7fde3382404a24d920711707b8a5359e420b
Malware Config
Extracted
Family
zloader
Botnet
09/04
C2
https://eoieowo.casa/wp-config.php
https://dcgljuzrb.pw/wp-config.php
rc4.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4048 set thread context of 372 4048 regsvr32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 372 msiexec.exe Token: SeSecurityPrivilege 372 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1304 wrote to memory of 4048 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 4048 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 4048 1304 regsvr32.exe regsvr32.exe PID 4048 wrote to memory of 372 4048 regsvr32.exe msiexec.exe PID 4048 wrote to memory of 372 4048 regsvr32.exe msiexec.exe PID 4048 wrote to memory of 372 4048 regsvr32.exe msiexec.exe PID 4048 wrote to memory of 372 4048 regsvr32.exe msiexec.exe PID 4048 wrote to memory of 372 4048 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f1987289f7a42f8ef652f6f6504991dbf0cd00a92653c544f67f1f25d4361ffc.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken