Resubmissions
23-03-2021 23:39
210323-gwmsg5pk56 10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-03-2021 23:39
Behavioral task
behavioral1
Sample
e4d0a79d2463c5d3a71874e3389fa753f480b96639ad32baf1997baf8e5f714a.dll
Resource
win7v20201028
General
-
Target
e4d0a79d2463c5d3a71874e3389fa753f480b96639ad32baf1997baf8e5f714a.dll
-
Size
187KB
-
MD5
6a900d6f8af3a1a0e31ca5bb63637d03
-
SHA1
221ab3d8ab16a0a7790026aab9b26904be6db436
-
SHA256
e4d0a79d2463c5d3a71874e3389fa753f480b96639ad32baf1997baf8e5f714a
-
SHA512
7565f88ae40d6ab1953fc018694154846f8ab98410239947ad5101686cbb9a59032858cb12218e89e27715d1d77a8b941141137886e241924a8f3801999661a8
Malware Config
Extracted
zloader
Apr14
Spam
http://wmwifbajxxbcxmucxmlc.com/post.php
http://ojnxjgfjlftfkkuxxiqd.com/post.php
http://pwkqhdgytsshkoibaake.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fyratyubvflktyyjiqgq.com/post.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 1676 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 836 set thread context of 1676 836 regsvr32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1676 msiexec.exe Token: SeSecurityPrivilege 1676 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1096 wrote to memory of 836 1096 regsvr32.exe 26 PID 1096 wrote to memory of 836 1096 regsvr32.exe 26 PID 1096 wrote to memory of 836 1096 regsvr32.exe 26 PID 1096 wrote to memory of 836 1096 regsvr32.exe 26 PID 1096 wrote to memory of 836 1096 regsvr32.exe 26 PID 1096 wrote to memory of 836 1096 regsvr32.exe 26 PID 1096 wrote to memory of 836 1096 regsvr32.exe 26 PID 836 wrote to memory of 1676 836 regsvr32.exe 30 PID 836 wrote to memory of 1676 836 regsvr32.exe 30 PID 836 wrote to memory of 1676 836 regsvr32.exe 30 PID 836 wrote to memory of 1676 836 regsvr32.exe 30 PID 836 wrote to memory of 1676 836 regsvr32.exe 30 PID 836 wrote to memory of 1676 836 regsvr32.exe 30 PID 836 wrote to memory of 1676 836 regsvr32.exe 30 PID 836 wrote to memory of 1676 836 regsvr32.exe 30 PID 836 wrote to memory of 1676 836 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e4d0a79d2463c5d3a71874e3389fa753f480b96639ad32baf1997baf8e5f714a.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e4d0a79d2463c5d3a71874e3389fa753f480b96639ad32baf1997baf8e5f714a.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-