Analysis
-
max time kernel
32s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-03-2021 11:05
Static task
static1
Behavioral task
behavioral1
Sample
bd8fb3c8abf97cdd741af7e8fd921a3b5d4a1efde9490933e405baa8f5226101.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
bd8fb3c8abf97cdd741af7e8fd921a3b5d4a1efde9490933e405baa8f5226101.dll
Resource
win10v20201028
General
-
Target
bd8fb3c8abf97cdd741af7e8fd921a3b5d4a1efde9490933e405baa8f5226101.dll
-
Size
357KB
-
MD5
9fc59f68d528d95e13a706e6f5c8cc9d
-
SHA1
64b3489a39907d5a8adc8fabf18afeb6f573a97e
-
SHA256
bd8fb3c8abf97cdd741af7e8fd921a3b5d4a1efde9490933e405baa8f5226101
-
SHA512
a1e5df2e959ced5b4d16bfbbef512e2129e3d82e4fd799ad6e24728a29903617b54a1c7af322215a5899ab03cd51f17eaa8e57a27644398c8a08e42c42cf3712
Malware Config
Extracted
zloader
googleaktualizacija
googleaktualizacija2
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1940 wrote to memory of 1460 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1460 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1460 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1460 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1460 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1460 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1460 1940 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd8fb3c8abf97cdd741af7e8fd921a3b5d4a1efde9490933e405baa8f5226101.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd8fb3c8abf97cdd741af7e8fd921a3b5d4a1efde9490933e405baa8f5226101.dll,#12⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/888-9-0x000007FEF7120000-0x000007FEF739A000-memory.dmpFilesize
2.5MB
-
memory/1460-2-0x0000000000000000-mapping.dmp
-
memory/1460-3-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/1460-4-0x0000000000200000-0x0000000000222000-memory.dmpFilesize
136KB
-
memory/1460-5-0x0000000010000000-0x0000000010026000-memory.dmpFilesize
152KB
-
memory/1632-6-0x0000000000000000-mapping.dmp
-
memory/1632-8-0x00000000000D0000-0x00000000000F6000-memory.dmpFilesize
152KB