Resubmissions

04-03-2021 12:41

210304-8d8tebnpxe 10

12-05-2020 16:47

200512-91qxgeb7d6 10

Analysis

  • max time kernel
    100s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-03-2021 12:41

General

  • Target

    2.dll

  • Size

    797KB

  • MD5

    3188d2f01ddf123f02b626c390886f66

  • SHA1

    f342f7b0b49526047ef80e8fa916ea4c7afefacd

  • SHA256

    7d5ef8e6c5738ebc13718eee67f0b6cc354f3e28b135e4a378f69d57043299b8

  • SHA512

    ebcb8ccf28c76eee2ee683259af0c05088a2e0b862da35707037c2eb4c28b4c70cc7ae31e377893978a9c2f28a0fa6a3e738d9ba8700857b3f7184592be5d7b3

Score
10/10

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1104-2-0x0000000000000000-mapping.dmp
  • memory/1104-3-0x0000000072D00000-0x0000000072D35000-memory.dmp
    Filesize

    212KB

  • memory/1104-4-0x00000000005E0000-0x00000000005E1000-memory.dmp
    Filesize

    4KB

  • memory/3944-5-0x0000000000000000-mapping.dmp
  • memory/3944-6-0x0000000002A70000-0x0000000002AA5000-memory.dmp
    Filesize

    212KB