Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
04-10-2021 22:36
Static task
static1
Behavioral task
behavioral1
Sample
zloader_1_0_2_0.dll
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zloader_1_0_2_0.dll
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
zloader_1_0_2_0.dll
-
Size
338KB
-
MD5
62d565051f3cae6d6bc8971420bec819
-
SHA1
b6c0f532108a3b392e9d8c1b0cfbf85cf8aa8fb3
-
SHA256
f1bdd2bcbaf40bb99224fa293edc1581fd124da63c035657918877901d79bed8
-
SHA512
c1401aeb4788ff39a501529ab3cd55223570404657be98c137326d76f7a23e5bf6dbb1faefd609519819c509ffcfd4d47f06c09afacad460485fbda9eb87d9ff
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Edhody = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Fygy\\uhef.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2000 set thread context of 608 2000 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 608 msiexec.exe Token: SeSecurityPrivilege 608 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2008 wrote to memory of 2000 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2000 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2000 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2000 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2000 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2000 2008 rundll32.exe rundll32.exe PID 2008 wrote to memory of 2000 2008 rundll32.exe rundll32.exe PID 2000 wrote to memory of 608 2000 rundll32.exe msiexec.exe PID 2000 wrote to memory of 608 2000 rundll32.exe msiexec.exe PID 2000 wrote to memory of 608 2000 rundll32.exe msiexec.exe PID 2000 wrote to memory of 608 2000 rundll32.exe msiexec.exe PID 2000 wrote to memory of 608 2000 rundll32.exe msiexec.exe PID 2000 wrote to memory of 608 2000 rundll32.exe msiexec.exe PID 2000 wrote to memory of 608 2000 rundll32.exe msiexec.exe PID 2000 wrote to memory of 608 2000 rundll32.exe msiexec.exe PID 2000 wrote to memory of 608 2000 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zloader_1_0_2_0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zloader_1_0_2_0.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:608