Resubmissions
04-11-2021 14:56
211104-sa37gaghb3 1026-10-2021 13:37
211026-qwzp3ahfb2 1021-10-2021 22:13
211021-143rssbgdj 10Analysis
-
max time kernel
83s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-11-2021 14:56
Static task
static1
Behavioral task
behavioral1
Sample
95a8370c36d81ea596d83892115ce6b90717396c8f657b17696c7eeb2dba1d2e.dll
Resource
win7-en-20210920
General
-
Target
95a8370c36d81ea596d83892115ce6b90717396c8f657b17696c7eeb2dba1d2e.dll
-
Size
429KB
-
MD5
75784d297b3d6fb4d434b6890f6334ab
-
SHA1
dc945e57be6bdd3cc4894d6cff7dd90a76f6c416
-
SHA256
95a8370c36d81ea596d83892115ce6b90717396c8f657b17696c7eeb2dba1d2e
-
SHA512
f54baffc5b545aaa4d939505181466d7b78bb583fd32da6cbf8cea058fca8869e8bf7bf3272f43d09a7b24dc6e821c9aa0e3875dd2959173e704d57568915fa1
Malware Config
Extracted
zloader
tim
tim
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
-
build_id
157
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
regsvr32.exedescription ioc process File opened for modification C:\Windows\ regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2616 wrote to memory of 2648 2616 regsvr32.exe regsvr32.exe PID 2616 wrote to memory of 2648 2616 regsvr32.exe regsvr32.exe PID 2616 wrote to memory of 2648 2616 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\95a8370c36d81ea596d83892115ce6b90717396c8f657b17696c7eeb2dba1d2e.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\95a8370c36d81ea596d83892115ce6b90717396c8f657b17696c7eeb2dba1d2e.dll2⤵
- Drops file in Windows directory
PID:2648