Resubmissions
05-11-2021 10:01
211105-l2l9psgebn 1012-10-2021 18:42
211012-xcg48sdbb9 1012-10-2021 18:06
211012-wpvenachc6 1012-10-2021 17:54
211012-wg5knachb5 1007-10-2021 08:47
211007-kpvvmscchl 10Analysis
-
max time kernel
36s -
max time network
123s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-10-2021 18:06
Static task
static1
Behavioral task
behavioral1
Sample
b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll
Resource
win7-en-20210920
General
-
Target
b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll
-
Size
298KB
-
MD5
a80859c1cd44daad1450948a1276bc0d
-
SHA1
46396892b9cafb2e59b8f667ec7822d0435384bb
-
SHA256
b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f
-
SHA512
ce68470318b8472b30aeee8778802ca4c9175f075a9c19c8332a08a6a8518a2f157a9e2ccaedba1d42f83f591d3c5f233ee1b8b8fbb90589aae82c9dea68352c
Malware Config
Extracted
zloader
nut
22/03
https://svilapp.svgipsar.org/post.php
https://nadar-gis.com/post.php
https://crearqarquitectos.com/post.php
https://crown-sign.com/post.php
https://dainikjahan.com/post.php
https://denatureedutech.com/post.php
https://alekllemtilaro.tk/post.php
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 776 wrote to memory of 368 776 rundll32.exe rundll32.exe PID 776 wrote to memory of 368 776 rundll32.exe rundll32.exe PID 776 wrote to memory of 368 776 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b270e245132cf6624fc96642532a00c0a16681f59542220ad2c389d45865141f.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/368-114-0x0000000000000000-mapping.dmp
-
memory/368-116-0x0000000074380000-0x0000000074425000-memory.dmpFilesize
660KB
-
memory/368-115-0x0000000074380000-0x00000000743AB000-memory.dmpFilesize
172KB
-
memory/368-117-0x0000000002DE0000-0x0000000002DE1000-memory.dmpFilesize
4KB