Analysis
-
max time kernel
46s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-03-2021 16:05
Static task
static1
Behavioral task
behavioral1
Sample
607a091d00b4660179f3b9c85bf1cd66edf3a2bc6bfcd794e60030b67363464c.exe.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
607a091d00b4660179f3b9c85bf1cd66edf3a2bc6bfcd794e60030b67363464c.exe.dll
Resource
win10v20201028
General
-
Target
607a091d00b4660179f3b9c85bf1cd66edf3a2bc6bfcd794e60030b67363464c.exe.dll
-
Size
369KB
-
MD5
08fb0dfc406671b03c9c9b8f39238321
-
SHA1
0b85e55d662fc7f87c142250ffa54a52eb3df3cb
-
SHA256
607a091d00b4660179f3b9c85bf1cd66edf3a2bc6bfcd794e60030b67363464c
-
SHA512
e320d16b78a82835cf5d3aa762e83a32429998d062f8c832a437b20d00c69295223503f9b20766c7cfe5e45478d3c09ae0f44c2744875905f684a461af2f0c25
Malware Config
Extracted
zloader
personal
personal
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1932 wrote to memory of 1356 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1356 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1356 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1356 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1356 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1356 1932 regsvr32.exe regsvr32.exe PID 1932 wrote to memory of 1356 1932 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\607a091d00b4660179f3b9c85bf1cd66edf3a2bc6bfcd794e60030b67363464c.exe.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\607a091d00b4660179f3b9c85bf1cd66edf3a2bc6bfcd794e60030b67363464c.exe.dll2⤵PID:1356
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:800
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/800-7-0x0000000000000000-mapping.dmp
-
memory/800-9-0x0000000000090000-0x00000000000B6000-memory.dmpFilesize
152KB
-
memory/1356-3-0x0000000000000000-mapping.dmp
-
memory/1356-4-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/1356-5-0x00000000005F0000-0x00000000005F1000-memory.dmpFilesize
4KB
-
memory/1356-6-0x0000000000580000-0x00000000005E3000-memory.dmpFilesize
396KB
-
memory/1660-10-0x000007FEF5BC0000-0x000007FEF5E3A000-memory.dmpFilesize
2.5MB
-
memory/1932-2-0x000007FEFB541000-0x000007FEFB543000-memory.dmpFilesize
8KB