Analysis

  • max time kernel
    142s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-03-2021 00:52

General

  • Target

    c8c5815fe4a06a752e51f79332a393db1f91a8e39b67899aa996e4ca76cfa675.dll

  • Size

    400KB

  • MD5

    3cf481ccbb1019894fcbacb554f3bda1

  • SHA1

    63c11153ab0afb36703723c5121cd0e9b48ac6e8

  • SHA256

    c8c5815fe4a06a752e51f79332a393db1f91a8e39b67899aa996e4ca76cfa675

  • SHA512

    628e34581b3ebc7645639f2e6da19ce15afb794cc032e99d895841eecef0bd372da27895a9485bb18630864b921c1239fa6e4904d6bd6f54ca80a220a3fe66d0

Malware Config

Extracted

Family

zloader

Botnet

nut

Campaign

12/11

C2

https://tfbuildingjoinery.co.uk/robots.php

https://globalpacificproperties.com.au/terms.php

https://www.loonybinforum.com/errors.php

https://luminousintent.com.au/wp-smarts.php

https://espazioabierto.com/wp-smarts.php

https://racriporrosepo.tk/wp-smarts.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Blocklisted process makes network request 15 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3128
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\c8c5815fe4a06a752e51f79332a393db1f91a8e39b67899aa996e4ca76cfa675.dll,#1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4684
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of AdjustPrivilegeToken
        PID:3984
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c8c5815fe4a06a752e51f79332a393db1f91a8e39b67899aa996e4ca76cfa675.dll,#1
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4696

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3984-5-0x0000000000000000-mapping.dmp
    • memory/3984-6-0x0000000000CD0000-0x0000000000CF6000-memory.dmp
      Filesize

      152KB

    • memory/4696-2-0x0000000000000000-mapping.dmp
    • memory/4696-3-0x0000000010000000-0x0000000010026000-memory.dmp
      Filesize

      152KB

    • memory/4696-4-0x0000000002C50000-0x0000000002C51000-memory.dmp
      Filesize

      4KB