Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-03-2021 13:48
Static task
static1
Behavioral task
behavioral1
Sample
w.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
w.dll
-
Size
492KB
-
MD5
892fbc87fdbcbe9d91e17ae7355eb54c
-
SHA1
c0e25d2f02a768def644be6c248732da4f91495b
-
SHA256
67b46301815d5ba32f90af114a459810902ba6d97a75821c8455b8103073b499
-
SHA512
09c30eef3c57be57ef396ff1c2de92f0cff1b57bea0e56ab6401b844b4c5982c7a56f3ef708d0aff2bb6ea1baaef5cf39098b6623bc529c579b35ad73ea4039a
Malware Config
Extracted
Family
zloader
Botnet
miguel
Campaign
05/06
C2
https://gahotimaskever.ga/wp-parser.php
https://tlenexicagopca.tk/wp-parser.php
http://cld.kazgau.com/wp-parser.php
https://cmso.med.cmu.ac.th/wp-parser.php
http://janekleeb.com/wp-parser.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Blocklisted process makes network request 14 IoCs
Processes:
msiexec.exeflow pid process 7 1944 msiexec.exe 8 1944 msiexec.exe 9 1944 msiexec.exe 10 1944 msiexec.exe 11 1944 msiexec.exe 12 1944 msiexec.exe 14 1944 msiexec.exe 15 1944 msiexec.exe 16 1944 msiexec.exe 17 1944 msiexec.exe 18 1944 msiexec.exe 19 1944 msiexec.exe 21 1944 msiexec.exe 24 1944 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 284 set thread context of 1944 284 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1944 msiexec.exe Token: SeSecurityPrivilege 1944 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1432 wrote to memory of 284 1432 rundll32.exe rundll32.exe PID 1432 wrote to memory of 284 1432 rundll32.exe rundll32.exe PID 1432 wrote to memory of 284 1432 rundll32.exe rundll32.exe PID 1432 wrote to memory of 284 1432 rundll32.exe rundll32.exe PID 1432 wrote to memory of 284 1432 rundll32.exe rundll32.exe PID 1432 wrote to memory of 284 1432 rundll32.exe rundll32.exe PID 1432 wrote to memory of 284 1432 rundll32.exe rundll32.exe PID 284 wrote to memory of 1944 284 rundll32.exe msiexec.exe PID 284 wrote to memory of 1944 284 rundll32.exe msiexec.exe PID 284 wrote to memory of 1944 284 rundll32.exe msiexec.exe PID 284 wrote to memory of 1944 284 rundll32.exe msiexec.exe PID 284 wrote to memory of 1944 284 rundll32.exe msiexec.exe PID 284 wrote to memory of 1944 284 rundll32.exe msiexec.exe PID 284 wrote to memory of 1944 284 rundll32.exe msiexec.exe PID 284 wrote to memory of 1944 284 rundll32.exe msiexec.exe PID 284 wrote to memory of 1944 284 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\w.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\w.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/284-2-0x0000000000000000-mapping.dmp
-
memory/284-3-0x0000000075BF1000-0x0000000075BF3000-memory.dmpFilesize
8KB
-
memory/284-4-0x0000000074A60000-0x0000000074A8B000-memory.dmpFilesize
172KB
-
memory/284-5-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/432-9-0x000007FEF74A0000-0x000007FEF771A000-memory.dmpFilesize
2.5MB
-
memory/1944-6-0x0000000000000000-mapping.dmp
-
memory/1944-8-0x0000000000090000-0x00000000000BB000-memory.dmpFilesize
172KB