Analysis
-
max time kernel
98s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-12-2020 17:13
Static task
static1
Behavioral task
behavioral1
Sample
f7c5fdac4daf9505c16d353fa9b0b577.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f7c5fdac4daf9505c16d353fa9b0b577.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
f7c5fdac4daf9505c16d353fa9b0b577.dll
-
Size
667KB
-
MD5
f7c5fdac4daf9505c16d353fa9b0b577
-
SHA1
0195de0967e2a5a851280fd99464ec739e0979dd
-
SHA256
4c414d6237c225d3bba766647807b0f2c32d4f400e585ee3f7fbe3d8b3b54c70
-
SHA512
e1f4fc7518895b6e936f4b528ff922f47c7dbe9596c3cf4f38fabf1e2a36117bf04269bb1f64b3beada6ccca6713c7f4bc79345f45e71dc691562bf6ba137892
Malware Config
Extracted
Family
zloader
Botnet
dll26
Campaign
dll26
C2
https://eecakesconf.at/web982/gate.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1824 wrote to memory of 1192 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1192 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1192 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1192 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1192 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1192 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1192 1824 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7c5fdac4daf9505c16d353fa9b0b577.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7c5fdac4daf9505c16d353fa9b0b577.dll,#12⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/284-3-0x0000000000090000-0x00000000000B6000-memory.dmpFilesize
152KB
-
memory/284-4-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/284-5-0x0000000000090000-0x00000000000B6000-memory.dmpFilesize
152KB
-
memory/284-6-0x0000000000000000-mapping.dmp
-
memory/1192-2-0x0000000000000000-mapping.dmp