Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-03-2021 01:50
Behavioral task
behavioral1
Sample
bc90f78262d08adeb79ec5bff75d292820658ad3cf7c71f12d3f8173272f1d50.dll
Resource
win7v20201028
General
-
Target
bc90f78262d08adeb79ec5bff75d292820658ad3cf7c71f12d3f8173272f1d50.dll
-
Size
182KB
-
MD5
6db05bcfe9c321569641a1ad74dd94e8
-
SHA1
5715d64a25e570bd39d1bbb611eeeb006f143899
-
SHA256
bc90f78262d08adeb79ec5bff75d292820658ad3cf7c71f12d3f8173272f1d50
-
SHA512
7e7bc4d6d1e9ff581312e8e60a29fc4607966db80f0997a930861a0f5d5826f286fa8398dbd7c33b91ca36e13e088c2b183a4cb1f78aad55a2d6b290e3ad46a0
Malware Config
Extracted
zloader
apr07
Canada
http://march262020.best/post.php
http://march262020.club/post.php
http://march262020.com/post.php
http://march262020.live/post.php
http://march262020.network/post.php
http://march262020.online/post.php
http://march262020.site/post.php
http://march262020.store/post.php
http://march262020.tech/post.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2000 set thread context of 1348 2000 regsvr32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1348 msiexec.exe Token: SeSecurityPrivilege 1348 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 296 wrote to memory of 2000 296 regsvr32.exe regsvr32.exe PID 296 wrote to memory of 2000 296 regsvr32.exe regsvr32.exe PID 296 wrote to memory of 2000 296 regsvr32.exe regsvr32.exe PID 296 wrote to memory of 2000 296 regsvr32.exe regsvr32.exe PID 296 wrote to memory of 2000 296 regsvr32.exe regsvr32.exe PID 296 wrote to memory of 2000 296 regsvr32.exe regsvr32.exe PID 296 wrote to memory of 2000 296 regsvr32.exe regsvr32.exe PID 2000 wrote to memory of 1348 2000 regsvr32.exe msiexec.exe PID 2000 wrote to memory of 1348 2000 regsvr32.exe msiexec.exe PID 2000 wrote to memory of 1348 2000 regsvr32.exe msiexec.exe PID 2000 wrote to memory of 1348 2000 regsvr32.exe msiexec.exe PID 2000 wrote to memory of 1348 2000 regsvr32.exe msiexec.exe PID 2000 wrote to memory of 1348 2000 regsvr32.exe msiexec.exe PID 2000 wrote to memory of 1348 2000 regsvr32.exe msiexec.exe PID 2000 wrote to memory of 1348 2000 regsvr32.exe msiexec.exe PID 2000 wrote to memory of 1348 2000 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\bc90f78262d08adeb79ec5bff75d292820658ad3cf7c71f12d3f8173272f1d50.dll1⤵
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\bc90f78262d08adeb79ec5bff75d292820658ad3cf7c71f12d3f8173272f1d50.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348