Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-03-2021 17:09
Static task
static1
Behavioral task
behavioral1
Sample
ISLeRPs.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ISLeRPs.dll
Resource
win10v20201028
General
-
Target
ISLeRPs.dll
-
Size
744KB
-
MD5
34379df22c95ed0f82ccb5f91f8a7069
-
SHA1
5bf00c67f45de592866b2fc91963dc83057390f4
-
SHA256
77184f1532fef0b593262fdd95ff1f2d2637fe08be003304d4e44f358c67b2d1
-
SHA512
bd446f119df944c9c7ea0603e3b05f893d030b337163cd527c00c0f601ea24ceabdc77f26103e9002daac0597d6e390b8ebf3296bc904f469d243f235c4cd35e
Malware Config
Extracted
zloader
nut
11/03
https://benjaminecomstore.com/post.php
https://hactivehealth.com/post.php
https://kediae.com/post.php
https://lawrencesstore.com/post.php
https://mylbecommerce.com/post.php
https://modernessentails.com/post.php
https://loanjarube.com/post.php
https://mylolabrands.com/post.php
https://riamanlisibuslae.ga/post.php
Signatures
-
Blocklisted process makes network request 64 IoCs
Processes:
msiexec.exeflow pid process 6 1356 msiexec.exe 7 1356 msiexec.exe 8 1356 msiexec.exe 9 1356 msiexec.exe 10 1356 msiexec.exe 11 1356 msiexec.exe 12 1356 msiexec.exe 13 1356 msiexec.exe 14 1356 msiexec.exe 15 1356 msiexec.exe 16 1356 msiexec.exe 17 1356 msiexec.exe 18 1356 msiexec.exe 19 1356 msiexec.exe 20 1356 msiexec.exe 21 1356 msiexec.exe 22 1356 msiexec.exe 23 1356 msiexec.exe 24 1356 msiexec.exe 25 1356 msiexec.exe 26 1356 msiexec.exe 28 1356 msiexec.exe 29 1356 msiexec.exe 30 1356 msiexec.exe 32 1356 msiexec.exe 33 1356 msiexec.exe 34 1356 msiexec.exe 35 1356 msiexec.exe 36 1356 msiexec.exe 37 1356 msiexec.exe 38 1356 msiexec.exe 39 1356 msiexec.exe 40 1356 msiexec.exe 41 1356 msiexec.exe 42 1356 msiexec.exe 43 1356 msiexec.exe 44 1356 msiexec.exe 45 1356 msiexec.exe 46 1356 msiexec.exe 47 1356 msiexec.exe 48 1356 msiexec.exe 49 1356 msiexec.exe 50 1356 msiexec.exe 51 1356 msiexec.exe 52 1356 msiexec.exe 54 1356 msiexec.exe 55 1356 msiexec.exe 56 1356 msiexec.exe 58 1356 msiexec.exe 59 1356 msiexec.exe 60 1356 msiexec.exe 61 1356 msiexec.exe 62 1356 msiexec.exe 63 1356 msiexec.exe 64 1356 msiexec.exe 65 1356 msiexec.exe 66 1356 msiexec.exe 67 1356 msiexec.exe 68 1356 msiexec.exe 69 1356 msiexec.exe 70 1356 msiexec.exe 71 1356 msiexec.exe 72 1356 msiexec.exe 73 1356 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1920 set thread context of 1356 1920 regsvr32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1356 msiexec.exe Token: SeSecurityPrivilege 1356 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1724 wrote to memory of 1920 1724 regsvr32.exe regsvr32.exe PID 1724 wrote to memory of 1920 1724 regsvr32.exe regsvr32.exe PID 1724 wrote to memory of 1920 1724 regsvr32.exe regsvr32.exe PID 1724 wrote to memory of 1920 1724 regsvr32.exe regsvr32.exe PID 1724 wrote to memory of 1920 1724 regsvr32.exe regsvr32.exe PID 1724 wrote to memory of 1920 1724 regsvr32.exe regsvr32.exe PID 1724 wrote to memory of 1920 1724 regsvr32.exe regsvr32.exe PID 1920 wrote to memory of 1356 1920 regsvr32.exe msiexec.exe PID 1920 wrote to memory of 1356 1920 regsvr32.exe msiexec.exe PID 1920 wrote to memory of 1356 1920 regsvr32.exe msiexec.exe PID 1920 wrote to memory of 1356 1920 regsvr32.exe msiexec.exe PID 1920 wrote to memory of 1356 1920 regsvr32.exe msiexec.exe PID 1920 wrote to memory of 1356 1920 regsvr32.exe msiexec.exe PID 1920 wrote to memory of 1356 1920 regsvr32.exe msiexec.exe PID 1920 wrote to memory of 1356 1920 regsvr32.exe msiexec.exe PID 1920 wrote to memory of 1356 1920 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ISLeRPs.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ISLeRPs.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1356