Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-03-2021 12:26
Static task
static1
Behavioral task
behavioral1
Sample
todxofs.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
todxofs.dll
Resource
win10v20201028
General
-
Target
todxofs.dll
-
Size
421KB
-
MD5
f40160b2cfe0667cb4010a400a835a06
-
SHA1
976c70ede8d10e825cb9e5bd5da0dd2a251bd0e8
-
SHA256
d63088780e90eda6a7ce286d6b190614f0ea6f1f55c6e6e9d6a30260eb84d03c
-
SHA512
e919819cdc45b2ed93c69f3f0267698940ee316707f6a722697100bfa79da9d277667c0276f36ba47f62dea8855e18e0e8ffaf5a708b369d73d2961b9fdfc3b4
Malware Config
Extracted
zloader
April23Fixed
April23Fixed
http://wmwifbajxxbcxmucxmlc.com/post.php
http://onfovdaqqrwbvdfoqnof.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1360 set thread context of 984 1360 rundll32.exe 79 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 984 msiexec.exe Token: SeSecurityPrivilege 984 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1360 1308 rundll32.exe 28 PID 1308 wrote to memory of 1360 1308 rundll32.exe 28 PID 1308 wrote to memory of 1360 1308 rundll32.exe 28 PID 1360 wrote to memory of 984 1360 rundll32.exe 79 PID 1360 wrote to memory of 984 1360 rundll32.exe 79 PID 1360 wrote to memory of 984 1360 rundll32.exe 79 PID 1360 wrote to memory of 984 1360 rundll32.exe 79 PID 1360 wrote to memory of 984 1360 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\todxofs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\todxofs.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-