Resubmissions
05-11-2021 10:01
211105-l2l9psgebn 1012-10-2021 18:42
211012-xcg48sdbb9 1012-10-2021 18:06
211012-wpvenachc6 1012-10-2021 17:54
211012-wg5knachb5 1007-10-2021 08:47
211007-kpvvmscchl 10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
12-10-2021 17:54
Static task
static1
Behavioral task
behavioral1
Sample
b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll
Resource
win7-en-20210920
General
-
Target
b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll
-
Size
298KB
-
MD5
a80859c1cd44daad1450948a1276bc0d
-
SHA1
46396892b9cafb2e59b8f667ec7822d0435384bb
-
SHA256
b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f
-
SHA512
ce68470318b8472b30aeee8778802ca4c9175f075a9c19c8332a08a6a8518a2f157a9e2ccaedba1d42f83f591d3c5f233ee1b8b8fbb90589aae82c9dea68352c
Malware Config
Extracted
zloader
nut
22/03
https://svilapp.svgipsar.org/post.php
https://nadar-gis.com/post.php
https://crearqarquitectos.com/post.php
https://crown-sign.com/post.php
https://dainikjahan.com/post.php
https://denatureedutech.com/post.php
https://alekllemtilaro.tk/post.php
Signatures
-
Blocklisted process makes network request 25 IoCs
Processes:
msiexec.exeflow pid process 5 1768 msiexec.exe 6 1768 msiexec.exe 7 1768 msiexec.exe 8 1768 msiexec.exe 9 1768 msiexec.exe 10 1768 msiexec.exe 11 1768 msiexec.exe 12 1768 msiexec.exe 13 1768 msiexec.exe 14 1768 msiexec.exe 15 1768 msiexec.exe 16 1768 msiexec.exe 17 1768 msiexec.exe 18 1768 msiexec.exe 19 1768 msiexec.exe 20 1768 msiexec.exe 21 1768 msiexec.exe 22 1768 msiexec.exe 23 1768 msiexec.exe 24 1768 msiexec.exe 25 1768 msiexec.exe 27 1768 msiexec.exe 28 1768 msiexec.exe 29 1768 msiexec.exe 31 1768 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 812 set thread context of 1768 812 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1768 msiexec.exe Token: SeSecurityPrivilege 1768 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1620 wrote to memory of 812 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 812 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 812 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 812 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 812 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 812 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 812 1620 rundll32.exe rundll32.exe PID 812 wrote to memory of 1768 812 rundll32.exe msiexec.exe PID 812 wrote to memory of 1768 812 rundll32.exe msiexec.exe PID 812 wrote to memory of 1768 812 rundll32.exe msiexec.exe PID 812 wrote to memory of 1768 812 rundll32.exe msiexec.exe PID 812 wrote to memory of 1768 812 rundll32.exe msiexec.exe PID 812 wrote to memory of 1768 812 rundll32.exe msiexec.exe PID 812 wrote to memory of 1768 812 rundll32.exe msiexec.exe PID 812 wrote to memory of 1768 812 rundll32.exe msiexec.exe PID 812 wrote to memory of 1768 812 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/812-53-0x0000000000000000-mapping.dmp
-
memory/812-54-0x0000000076B61000-0x0000000076B63000-memory.dmpFilesize
8KB
-
memory/812-55-0x00000000751F0000-0x000000007521B000-memory.dmpFilesize
172KB
-
memory/812-56-0x00000000751F0000-0x0000000075295000-memory.dmpFilesize
660KB
-
memory/812-57-0x00000000000B0000-0x00000000000B1000-memory.dmpFilesize
4KB
-
memory/1768-59-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/1768-58-0x0000000000090000-0x00000000000BB000-memory.dmpFilesize
172KB
-
memory/1768-60-0x0000000000090000-0x00000000000BB000-memory.dmpFilesize
172KB
-
memory/1768-61-0x0000000000000000-mapping.dmp
-
memory/1768-63-0x0000000000090000-0x00000000000BB000-memory.dmpFilesize
172KB