Resubmissions
12-10-2021 18:50
211012-xhew3adbd2 1027-09-2021 20:56
210927-zrbbcaabhl 1014-09-2021 15:35
210914-s1ddqsfhf8 10Analysis
-
max time kernel
67s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
12-10-2021 18:50
Static task
static1
Behavioral task
behavioral1
Sample
tim.dll
Resource
win7v20210408
General
-
Target
tim.dll
-
Size
429KB
-
MD5
75784d297b3d6fb4d434b6890f6334ab
-
SHA1
dc945e57be6bdd3cc4894d6cff7dd90a76f6c416
-
SHA256
95a8370c36d81ea596d83892115ce6b90717396c8f657b17696c7eeb2dba1d2e
-
SHA512
f54baffc5b545aaa4d939505181466d7b78bb583fd32da6cbf8cea058fca8869e8bf7bf3272f43d09a7b24dc6e821c9aa0e3875dd2959173e704d57568915fa1
Malware Config
Extracted
zloader
tim
tim
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2804 1844 regsvr32.exe 69 PID 1844 wrote to memory of 2804 1844 regsvr32.exe 69 PID 1844 wrote to memory of 2804 1844 regsvr32.exe 69
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\tim.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\tim.dll2⤵
- Drops file in Windows directory
PID:2804 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:192
-
-