Resubmissions

12-10-2021 18:50

211012-xhew3adbd2 10

27-09-2021 20:56

210927-zrbbcaabhl 10

14-09-2021 15:35

210914-s1ddqsfhf8 10

Analysis

  • max time kernel
    1798s
  • max time network
    1802s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    27-09-2021 20:56

General

  • Target

    tim.dll

  • Size

    429KB

  • MD5

    75784d297b3d6fb4d434b6890f6334ab

  • SHA1

    dc945e57be6bdd3cc4894d6cff7dd90a76f6c416

  • SHA256

    95a8370c36d81ea596d83892115ce6b90717396c8f657b17696c7eeb2dba1d2e

  • SHA512

    f54baffc5b545aaa4d939505181466d7b78bb583fd32da6cbf8cea058fca8869e8bf7bf3272f43d09a7b24dc6e821c9aa0e3875dd2959173e704d57568915fa1

Malware Config

Extracted

Family

zloader

Botnet

tim

Campaign

tim

C2

https://iqowijsdakm.com/gate.php

https://wiewjdmkfjn.com/gate.php

https://dksaoidiakjd.com/gate.php

https://iweuiqjdakjd.com/gate.php

https://yuidskadjna.com/gate.php

https://olksmadnbdj.com/gate.php

https://odsakmdfnbs.com/gate.php

https://odsakjmdnhsaj.com/gate.php

https://odjdnhsaj.com/gate.php

https://odoishsaj.com/gate.php

rc4.plain
rsa_pubkey.plain

Extracted

Family

zloader

Botnet

personal

Campaign

personal

C2

https://iqowijsdakm.com/gate.php

https://wiewjdmkfjn.com/gate.php

https://dksaoidiakjd.com/gate.php

https://iweuiqjdakjd.com/gate.php

https://yuidskadjna.com/gate.php

https://olksmadnbdj.com/gate.php

https://odsakmdfnbs.com/gate.php

https://odsakjmdnhsaj.com/gate.php

https://odjdnhsaj.com/gate.php

https://odoishsaj.com/gate.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)

    suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)

  • suricata: ET MALWARE Observed ZLoader CnC Domain in SNI

    suricata: ET MALWARE Observed ZLoader CnC Domain in SNI

  • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

  • suricata: ET MALWARE Zbot POST Request to C2

    suricata: ET MALWARE Zbot POST Request to C2

  • Blocklisted process makes network request 64 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Discovers systems in the same network 1 TTPs 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\tim.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\tim.dll
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Blocklisted process makes network request
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ipconfig /all
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3996
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /all
            5⤵
            • Gathers network information
            PID:2032
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1684
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c net config workstation
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1188
          • C:\Windows\SysWOW64\net.exe
            net config workstation
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:824
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 config workstation
              6⤵
                PID:436
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c net view /all
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3968
            • C:\Windows\SysWOW64\net.exe
              net view /all
              5⤵
              • Discovers systems in the same network
              PID:3800
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c net view /all /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:644
            • C:\Windows\SysWOW64\net.exe
              net view /all /domain
              5⤵
              • Discovers systems in the same network
              PID:2340
          • C:\Users\Admin\AppData\Local\Temp\Ziobq\certutil.exe
            "C:\Users\Admin\AppData\Local\Temp\Ziobq\certutil.exe" -A -n "daecfi" -t "C,C,C" -i "C:\Users\Admin\AppData\Local\Temp\haaxyt.crt" -d sql:"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uc9n7vlb.default-release"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3052
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2636
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
            4⤵
              PID:308
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
              4⤵
                PID:2768
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                4⤵
                  PID:3568
                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                  WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                  4⤵
                    PID:3992
            • C:\Windows\System32\rundll32.exe
              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
              1⤵
                PID:2288
              • C:\Windows\ImmersiveControlPanel\SystemSettings.exe
                "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel
                1⤵
                • Drops file in Windows directory
                • Checks SCSI registry key(s)
                • Suspicious use of SetWindowsHookEx
                PID:2960

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/940-123-0x0000000002FD0000-0x000000000301F000-memory.dmp

                Filesize

                316KB

              • memory/940-136-0x0000000005120000-0x0000000005161000-memory.dmp

                Filesize

                260KB

              • memory/940-138-0x0000000007740000-0x000000000791B000-memory.dmp

                Filesize

                1.9MB

              • memory/940-132-0x0000000004E90000-0x0000000004EA8000-memory.dmp

                Filesize

                96KB

              • memory/940-133-0x0000000006700000-0x00000000067CE000-memory.dmp

                Filesize

                824KB

              • memory/940-131-0x0000000003020000-0x0000000003023000-memory.dmp

                Filesize

                12KB

              • memory/940-121-0x0000000002E40000-0x0000000002E66000-memory.dmp

                Filesize

                152KB

              • memory/940-137-0x0000000005170000-0x0000000005171000-memory.dmp

                Filesize

                4KB

              • memory/2192-117-0x0000000010000000-0x0000000010072000-memory.dmp

                Filesize

                456KB

              • memory/2192-116-0x00000000021D0000-0x00000000021D1000-memory.dmp

                Filesize

                4KB