Analysis
-
max time kernel
104s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
07-07-2021 20:13
Static task
static1
Behavioral task
behavioral1
Sample
favicon.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
favicon.dll
-
Size
646KB
-
MD5
1d700b208c65ca26efe5fa4be4749569
-
SHA1
3deeff224b359ca2b28a841a116b84b783206adc
-
SHA256
f97954d9c80dbfee223fb704863c5a156912f450eee2d0510af6301dfd919f09
-
SHA512
8c5bcbdf35f4e3ad1177d98b0944b1ec9f407a7bd537af5ecd8e5aad37a67c4c46748bfbe165b4edb6348324e4b97d26a6e1af0007f458c3f697a6757cb05d92
Malware Config
Extracted
Family
zloader
Botnet
mk1
Campaign
mac2
C2
https://dssdffsdf.drld/mm.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3764 created 3008 3764 rundll32.exe Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3764 set thread context of 988 3764 rundll32.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3764 rundll32.exe 3764 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
rundll32.exemsiexec.exedescription pid process Token: SeDebugPrivilege 3764 rundll32.exe Token: SeSecurityPrivilege 988 msiexec.exe Token: SeSecurityPrivilege 988 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3984 wrote to memory of 3764 3984 rundll32.exe rundll32.exe PID 3984 wrote to memory of 3764 3984 rundll32.exe rundll32.exe PID 3984 wrote to memory of 3764 3984 rundll32.exe rundll32.exe PID 3764 wrote to memory of 988 3764 rundll32.exe msiexec.exe PID 3764 wrote to memory of 988 3764 rundll32.exe msiexec.exe PID 3764 wrote to memory of 988 3764 rundll32.exe msiexec.exe PID 3764 wrote to memory of 988 3764 rundll32.exe msiexec.exe PID 3764 wrote to memory of 988 3764 rundll32.exe msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3008
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\favicon.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\favicon.dll,#13⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:988