Resubmissions

04-03-2021 12:41

210304-8d8tebnpxe 10

12-05-2020 16:47

200512-91qxgeb7d6 10

Analysis

  • max time kernel
    94s
  • max time network
    8s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04-03-2021 12:41

General

  • Target

    2.dll

  • Size

    797KB

  • MD5

    3188d2f01ddf123f02b626c390886f66

  • SHA1

    f342f7b0b49526047ef80e8fa916ea4c7afefacd

  • SHA256

    7d5ef8e6c5738ebc13718eee67f0b6cc354f3e28b135e4a378f69d57043299b8

  • SHA512

    ebcb8ccf28c76eee2ee683259af0c05088a2e0b862da35707037c2eb4c28b4c70cc7ae31e377893978a9c2f28a0fa6a3e738d9ba8700857b3f7184592be5d7b3

Malware Config

Extracted

Family

zloader

Botnet

12/05

C2

https://japanjisho.info/wp-parser.php

https://home.comegico.com.mx/wp-parser.php

https://hormonas.comegico.com.mx/wp-parser.php

https://hopime.com/wp-parser.php

https://gavrelets.ru/wp-parser.php

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1092-2-0x0000000000000000-mapping.dmp
  • memory/1092-3-0x00000000761E1000-0x00000000761E3000-memory.dmp
    Filesize

    8KB

  • memory/1092-4-0x0000000072220000-0x0000000072255000-memory.dmp
    Filesize

    212KB

  • memory/1092-5-0x00000000001F0000-0x00000000001F1000-memory.dmp
    Filesize

    4KB

  • memory/1308-6-0x0000000000000000-mapping.dmp
  • memory/1308-8-0x00000000000D0000-0x0000000000105000-memory.dmp
    Filesize

    212KB