Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-11-2020 01:28
Static task
static1
Behavioral task
behavioral1
Sample
XRqW4.exe.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
XRqW4.exe.dll
Resource
win10v20201028
General
-
Target
XRqW4.exe.dll
-
Size
320KB
-
MD5
7ebb3ae8efec620294fdfa3e99da78ea
-
SHA1
a545d8cd080a7237465ba3c63f8119d03369e005
-
SHA256
550187abd3b47d3796a1811dc016c935069ac631996de7cd428ae986b39b2107
-
SHA512
aa5ee27c3f3b55beefdda9103b9b548af9f04b41535b9e74379c3c8ed5904519766de4321a995047a63d958dafc20f82607b09678cf09f1b24ca29bec5facb0c
Malware Config
Extracted
zloader
nut
27/11
https://hac3r.com/wp-punch.php
https://womtools.com/wp-punch.php
https://valitec.co/wp-punch.php
https://empresascreciendobien.com/server.php
https://smartat.co/error.php
https://teamearenttopdiaty.ga/wp-smarts.php
Signatures
-
Blacklisted process makes network request 6 IoCs
Processes:
msiexec.exeflow pid process 7 1704 msiexec.exe 9 1704 msiexec.exe 11 1704 msiexec.exe 13 1704 msiexec.exe 15 1704 msiexec.exe 17 1704 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1844 set thread context of 1704 1844 regsvr32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1704 msiexec.exe Token: SeSecurityPrivilege 1704 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1036 wrote to memory of 1844 1036 regsvr32.exe regsvr32.exe PID 1036 wrote to memory of 1844 1036 regsvr32.exe regsvr32.exe PID 1036 wrote to memory of 1844 1036 regsvr32.exe regsvr32.exe PID 1036 wrote to memory of 1844 1036 regsvr32.exe regsvr32.exe PID 1036 wrote to memory of 1844 1036 regsvr32.exe regsvr32.exe PID 1036 wrote to memory of 1844 1036 regsvr32.exe regsvr32.exe PID 1036 wrote to memory of 1844 1036 regsvr32.exe regsvr32.exe PID 1844 wrote to memory of 1704 1844 regsvr32.exe msiexec.exe PID 1844 wrote to memory of 1704 1844 regsvr32.exe msiexec.exe PID 1844 wrote to memory of 1704 1844 regsvr32.exe msiexec.exe PID 1844 wrote to memory of 1704 1844 regsvr32.exe msiexec.exe PID 1844 wrote to memory of 1704 1844 regsvr32.exe msiexec.exe PID 1844 wrote to memory of 1704 1844 regsvr32.exe msiexec.exe PID 1844 wrote to memory of 1704 1844 regsvr32.exe msiexec.exe PID 1844 wrote to memory of 1704 1844 regsvr32.exe msiexec.exe PID 1844 wrote to memory of 1704 1844 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\XRqW4.exe.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\XRqW4.exe.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blacklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/288-7-0x000007FEF7880000-0x000007FEF7AFA000-memory.dmpFilesize
2.5MB
-
memory/1704-3-0x00000000000D0000-0x00000000000F6000-memory.dmpFilesize
152KB
-
memory/1704-4-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/1704-5-0x00000000000D0000-0x00000000000F6000-memory.dmpFilesize
152KB
-
memory/1704-6-0x0000000000000000-mapping.dmp
-
memory/1844-2-0x0000000000000000-mapping.dmp