Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-03-2021 11:33
Static task
static1
Behavioral task
behavioral1
Sample
f8503947e0e984865a29d1e3f8a62ce7034069f49c2a2dd902af68274f192224.dll
Resource
win7v20201028
General
-
Target
f8503947e0e984865a29d1e3f8a62ce7034069f49c2a2dd902af68274f192224.dll
-
Size
380KB
-
MD5
e0af3054669d6232870b87e1e239a689
-
SHA1
f0aa6e50471e70d07a1b70207f38538cb31ed569
-
SHA256
f8503947e0e984865a29d1e3f8a62ce7034069f49c2a2dd902af68274f192224
-
SHA512
1574e2aca2415a90677053da5f625d4a9e3bb2e85362cc7acc7b6430a35eb889883da1fda694d79ee38349fee01b5843d0717d864e2d801302755188308d513f
Malware Config
Extracted
zloader
kev
11/12
https://www.businessinsurancelaw.com/wp-punch.php
https://squire.ae/wp-punch.php
https://lamun.pk/wp-punch.php
https://www.rcclabbd.com/wp-punch.php
https://thecype.com/wp-punch.php
https://theterteboltallbrow.tk/wp-smarts.php
Signatures
-
Blocklisted process makes network request 62 IoCs
Processes:
msiexec.exeflow pid process 7 1860 msiexec.exe 9 1860 msiexec.exe 11 1860 msiexec.exe 12 1860 msiexec.exe 13 1860 msiexec.exe 14 1860 msiexec.exe 15 1860 msiexec.exe 16 1860 msiexec.exe 18 1860 msiexec.exe 19 1860 msiexec.exe 20 1860 msiexec.exe 21 1860 msiexec.exe 22 1860 msiexec.exe 23 1860 msiexec.exe 24 1860 msiexec.exe 25 1860 msiexec.exe 26 1860 msiexec.exe 27 1860 msiexec.exe 28 1860 msiexec.exe 29 1860 msiexec.exe 30 1860 msiexec.exe 31 1860 msiexec.exe 32 1860 msiexec.exe 33 1860 msiexec.exe 34 1860 msiexec.exe 35 1860 msiexec.exe 36 1860 msiexec.exe 37 1860 msiexec.exe 38 1860 msiexec.exe 39 1860 msiexec.exe 40 1860 msiexec.exe 41 1860 msiexec.exe 43 1860 msiexec.exe 44 1860 msiexec.exe 45 1860 msiexec.exe 46 1860 msiexec.exe 47 1860 msiexec.exe 48 1860 msiexec.exe 49 1860 msiexec.exe 50 1860 msiexec.exe 51 1860 msiexec.exe 52 1860 msiexec.exe 53 1860 msiexec.exe 54 1860 msiexec.exe 55 1860 msiexec.exe 56 1860 msiexec.exe 57 1860 msiexec.exe 58 1860 msiexec.exe 59 1860 msiexec.exe 60 1860 msiexec.exe 61 1860 msiexec.exe 62 1860 msiexec.exe 63 1860 msiexec.exe 64 1860 msiexec.exe 65 1860 msiexec.exe 66 1860 msiexec.exe 68 1860 msiexec.exe 69 1860 msiexec.exe 70 1860 msiexec.exe 71 1860 msiexec.exe 72 1860 msiexec.exe 73 1860 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1764 set thread context of 1860 1764 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1860 msiexec.exe Token: SeSecurityPrivilege 1860 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 892 wrote to memory of 1764 892 rundll32.exe rundll32.exe PID 892 wrote to memory of 1764 892 rundll32.exe rundll32.exe PID 892 wrote to memory of 1764 892 rundll32.exe rundll32.exe PID 892 wrote to memory of 1764 892 rundll32.exe rundll32.exe PID 892 wrote to memory of 1764 892 rundll32.exe rundll32.exe PID 892 wrote to memory of 1764 892 rundll32.exe rundll32.exe PID 892 wrote to memory of 1764 892 rundll32.exe rundll32.exe PID 1764 wrote to memory of 1860 1764 rundll32.exe msiexec.exe PID 1764 wrote to memory of 1860 1764 rundll32.exe msiexec.exe PID 1764 wrote to memory of 1860 1764 rundll32.exe msiexec.exe PID 1764 wrote to memory of 1860 1764 rundll32.exe msiexec.exe PID 1764 wrote to memory of 1860 1764 rundll32.exe msiexec.exe PID 1764 wrote to memory of 1860 1764 rundll32.exe msiexec.exe PID 1764 wrote to memory of 1860 1764 rundll32.exe msiexec.exe PID 1764 wrote to memory of 1860 1764 rundll32.exe msiexec.exe PID 1764 wrote to memory of 1860 1764 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8503947e0e984865a29d1e3f8a62ce7034069f49c2a2dd902af68274f192224.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8503947e0e984865a29d1e3f8a62ce7034069f49c2a2dd902af68274f192224.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1860