Analysis
-
max time kernel
52s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-06-2021 07:12
Static task
static1
Behavioral task
behavioral1
Sample
b73bae190d2c8d18cbf00584c496e4f570da582507dbdbacdc8893053e5996ae.dll
Resource
win7v20210410
General
-
Target
b73bae190d2c8d18cbf00584c496e4f570da582507dbdbacdc8893053e5996ae.dll
-
Size
306KB
-
MD5
4f134d35f7d1afe6c91085f38e27640d
-
SHA1
0102f545e6b8acefaff628159cd06697d9c520b7
-
SHA256
b73bae190d2c8d18cbf00584c496e4f570da582507dbdbacdc8893053e5996ae
-
SHA512
3bd09ea9b443fce5c9f78430b9e7254513907be81751ee671a133f7d2c46ad17c868fcdb5d382ee3a8cf4d2b931f5b07c2d86b52dea9f75b5dfa722b12c4abb9
Malware Config
Extracted
zloader
personal
personal
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1704 wrote to memory of 2236 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2236 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2236 1704 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b73bae190d2c8d18cbf00584c496e4f570da582507dbdbacdc8893053e5996ae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b73bae190d2c8d18cbf00584c496e4f570da582507dbdbacdc8893053e5996ae.dll,#12⤵PID:2236
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:3652
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2236-114-0x0000000000000000-mapping.dmp
-
memory/2236-115-0x0000000000AD0000-0x0000000000C1A000-memory.dmpFilesize
1.3MB
-
memory/2236-116-0x0000000010000000-0x0000000010050000-memory.dmpFilesize
320KB
-
memory/3652-117-0x0000000000000000-mapping.dmp
-
memory/3652-120-0x0000000003250000-0x0000000003276000-memory.dmpFilesize
152KB