Resubmissions
10-08-2023 17:09
230810-vn35qsfe85 1010-08-2023 16:29
230810-ty96csgg4t 1007-07-2021 20:32
210707-5mqmkk4eyx 10Analysis
-
max time kernel
76s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
07-07-2021 20:32
General
-
Target
1f41fd3e96ef1c1328d08ced03ac5e1b717a45cda8cf94a1c4ffe775e43623b8.dll
-
Size
172KB
-
MD5
2297dee946320ce03b8db35b1ae6462d
-
SHA1
5958e724e5cceca807531b2b1ea4b18a2a8698dd
-
SHA256
1f41fd3e96ef1c1328d08ced03ac5e1b717a45cda8cf94a1c4ffe775e43623b8
-
SHA512
560b1f80b5e96ae8281bbea2271476a2a38d6c55b231c4e5594d9581cf5cb0bdcfffb1cd02b4aca4249eb0e21b15ee48391c02d7170dfad410ae591243ff5188
Malware Config
Extracted
Family
zloader
Botnet
mk1
Campaign
mac2
C2
https://dssdffsdf.drld/mm.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 812 created 2996 812 regsvr32.exe 23 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 812 set thread context of 3376 812 regsvr32.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 812 regsvr32.exe 812 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 812 regsvr32.exe Token: SeSecurityPrivilege 3376 msiexec.exe Token: SeSecurityPrivilege 3376 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3904 wrote to memory of 812 3904 regsvr32.exe 73 PID 3904 wrote to memory of 812 3904 regsvr32.exe 73 PID 3904 wrote to memory of 812 3904 regsvr32.exe 73 PID 812 wrote to memory of 3376 812 regsvr32.exe 80 PID 812 wrote to memory of 3376 812 regsvr32.exe 80 PID 812 wrote to memory of 3376 812 regsvr32.exe 80 PID 812 wrote to memory of 3376 812 regsvr32.exe 80 PID 812 wrote to memory of 3376 812 regsvr32.exe 80
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2996
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1f41fd3e96ef1c1328d08ced03ac5e1b717a45cda8cf94a1c4ffe775e43623b8.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1f41fd3e96ef1c1328d08ced03ac5e1b717a45cda8cf94a1c4ffe775e43623b8.dll3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3376
-