Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-03-2021 12:26
Static task
static1
Behavioral task
behavioral1
Sample
todxofs.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
todxofs.dll
Resource
win10v20201028
General
-
Target
todxofs.dll
-
Size
421KB
-
MD5
f40160b2cfe0667cb4010a400a835a06
-
SHA1
976c70ede8d10e825cb9e5bd5da0dd2a251bd0e8
-
SHA256
d63088780e90eda6a7ce286d6b190614f0ea6f1f55c6e6e9d6a30260eb84d03c
-
SHA512
e919819cdc45b2ed93c69f3f0267698940ee316707f6a722697100bfa79da9d277667c0276f36ba47f62dea8855e18e0e8ffaf5a708b369d73d2961b9fdfc3b4
Malware Config
Extracted
zloader
April23Fixed
April23Fixed
http://wmwifbajxxbcxmucxmlc.com/post.php
http://onfovdaqqrwbvdfoqnof.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 1556 2040 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1556 msiexec.exe Token: SeSecurityPrivilege 1556 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2040 1856 rundll32.exe 25 PID 1856 wrote to memory of 2040 1856 rundll32.exe 25 PID 1856 wrote to memory of 2040 1856 rundll32.exe 25 PID 1856 wrote to memory of 2040 1856 rundll32.exe 25 PID 1856 wrote to memory of 2040 1856 rundll32.exe 25 PID 1856 wrote to memory of 2040 1856 rundll32.exe 25 PID 1856 wrote to memory of 2040 1856 rundll32.exe 25 PID 2040 wrote to memory of 1556 2040 rundll32.exe 30 PID 2040 wrote to memory of 1556 2040 rundll32.exe 30 PID 2040 wrote to memory of 1556 2040 rundll32.exe 30 PID 2040 wrote to memory of 1556 2040 rundll32.exe 30 PID 2040 wrote to memory of 1556 2040 rundll32.exe 30 PID 2040 wrote to memory of 1556 2040 rundll32.exe 30 PID 2040 wrote to memory of 1556 2040 rundll32.exe 30 PID 2040 wrote to memory of 1556 2040 rundll32.exe 30 PID 2040 wrote to memory of 1556 2040 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\todxofs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\todxofs.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-