Analysis
-
max time kernel
114s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-03-2021 13:28
Static task
static1
Behavioral task
behavioral1
Sample
mHMUKpx.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
mHMUKpx.dll
-
Size
706KB
-
MD5
051fc424638f35d333e95a0601cfd336
-
SHA1
3acbcb36bad30f486b03897ef4fd321dbfe40d40
-
SHA256
3a659be16afd89a3f8ba12745b545bc0bb4ddf747078b37186af00e7e332fbb2
-
SHA512
ed6276b62b3cad463b36861c75624d59ae15964959a07e39afeff1367f22afadfe1d8f72d2f01f8db73dd98da00a4bfc18938e78c48394440ea6ad9a0a095337
Malware Config
Extracted
Family
zloader
Botnet
bot5
Campaign
bot5
C2
https://militanttra.at/owg.php
rc4.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 4756 set thread context of 3176 4756 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 3176 msiexec.exe Token: SeSecurityPrivilege 3176 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4684 wrote to memory of 4756 4684 rundll32.exe rundll32.exe PID 4684 wrote to memory of 4756 4684 rundll32.exe rundll32.exe PID 4684 wrote to memory of 4756 4684 rundll32.exe rundll32.exe PID 4756 wrote to memory of 3176 4756 rundll32.exe msiexec.exe PID 4756 wrote to memory of 3176 4756 rundll32.exe msiexec.exe PID 4756 wrote to memory of 3176 4756 rundll32.exe msiexec.exe PID 4756 wrote to memory of 3176 4756 rundll32.exe msiexec.exe PID 4756 wrote to memory of 3176 4756 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\mHMUKpx.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\mHMUKpx.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3176