Analysis
-
max time kernel
26s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-04-2021 05:38
Static task
static1
Behavioral task
behavioral1
Sample
b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll
Resource
win7v20201028
General
-
Target
b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll
-
Size
298KB
-
MD5
a80859c1cd44daad1450948a1276bc0d
-
SHA1
46396892b9cafb2e59b8f667ec7822d0435384bb
-
SHA256
b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f
-
SHA512
ce68470318b8472b30aeee8778802ca4c9175f075a9c19c8332a08a6a8518a2f157a9e2ccaedba1d42f83f591d3c5f233ee1b8b8fbb90589aae82c9dea68352c
Malware Config
Extracted
zloader
nut
22/03
https://svilapp.svgipsar.org/post.php
https://nadar-gis.com/post.php
https://crearqarquitectos.com/post.php
https://crown-sign.com/post.php
https://dainikjahan.com/post.php
https://denatureedutech.com/post.php
https://alekllemtilaro.tk/post.php
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1032 wrote to memory of 3744 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 3744 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 3744 1032 rundll32.exe rundll32.exe
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll,#11⤵PID:3744
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1032