Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-11-2021 18:29
Static task
static1
Behavioral task
behavioral1
Sample
keaqxieb.dll
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
keaqxieb.dll
-
Size
412KB
-
MD5
d11eba83d05fe0789e5885558680b31b
-
SHA1
ebca52bcd828cc94a443b0565670f28de52e93db
-
SHA256
24ee365c548cb76e0b5a021e0ebaade9f95f9f5a26e4e4b96be5b238eb8f1f5b
-
SHA512
c125bb8a48464d1e6f3439742d577e1c56ba421e3d8657145bd75baa5a3d725a252e74cf4da97c2a20a6a4e928883943cdc62b95ac25ae9217eed09e9de4b260
Malware Config
Extracted
Family
zloader
Botnet
october
Campaign
october
C2
http://sept9stuff10.com/web/post.php
http://sept9stuff11.com/web/post.php
Attributes
-
build_id
54
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4056 wrote to memory of 3392 4056 regsvr32.exe regsvr32.exe PID 4056 wrote to memory of 3392 4056 regsvr32.exe regsvr32.exe PID 4056 wrote to memory of 3392 4056 regsvr32.exe regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3392-115-0x0000000000000000-mapping.dmp
-
memory/3392-116-0x00000000740E0000-0x0000000074108000-memory.dmpFilesize
160KB
-
memory/3392-117-0x00000000740E0000-0x0000000074159000-memory.dmpFilesize
484KB
-
memory/3392-118-0x0000000000760000-0x00000000008AA000-memory.dmpFilesize
1.3MB