Analysis
-
max time kernel
34s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-03-2021 10:29
Static task
static1
Behavioral task
behavioral1
Sample
3f1f00054377124affd8fb24f61b9a670858cc44282ffcf0341907f9dbcf1d51.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
3f1f00054377124affd8fb24f61b9a670858cc44282ffcf0341907f9dbcf1d51.dll
Resource
win10v20201028
General
-
Target
3f1f00054377124affd8fb24f61b9a670858cc44282ffcf0341907f9dbcf1d51.dll
-
Size
357KB
-
MD5
613edea279057e441e911ce8d1a4b7c8
-
SHA1
ec557b336ff11e216c669cc29c90a9e74771ee00
-
SHA256
3f1f00054377124affd8fb24f61b9a670858cc44282ffcf0341907f9dbcf1d51
-
SHA512
e65ad56aeb3d130d79f8870e49a5e3a6e49a0b8fd7a8cea152b70213f7073ab097d0dbd5cbf29b1f814463f92c6303030e70a5f78002bcfecc11f22a6590a5b6
Malware Config
Extracted
zloader
googleaktualizacija
googleaktualizacija2
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1784 wrote to memory of 1644 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1644 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1644 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1644 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1644 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1644 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1644 1784 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f1f00054377124affd8fb24f61b9a670858cc44282ffcf0341907f9dbcf1d51.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f1f00054377124affd8fb24f61b9a670858cc44282ffcf0341907f9dbcf1d51.dll,#12⤵PID:1644
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:896