Analysis
-
max time kernel
50s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
11-11-2021 11:58
Behavioral task
behavioral1
Sample
168af6b70609e45a8be1891659d23c70154e940a6fd7f9daf6f8e9bd5192c0c7.dll
Resource
win7-en-20211104
General
-
Target
168af6b70609e45a8be1891659d23c70154e940a6fd7f9daf6f8e9bd5192c0c7.dll
-
Size
131KB
-
MD5
28f10a71b6f73e66131efd2278c0b830
-
SHA1
c7a863d1df81c4995a3ad3f5ec339b1079923fd5
-
SHA256
168af6b70609e45a8be1891659d23c70154e940a6fd7f9daf6f8e9bd5192c0c7
-
SHA512
19d66cb8af5852b88ea4f238aea7128733cebde01eb5176c792387359387298d8158642add3fd418cd5ac5e366257bac425c3a36d0ba85efcb3b7b52f139e5be
Malware Config
Extracted
zloader
buldog
buldog
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
-
build_id
157
Signatures
-
suricata: ET MALWARE Observed ZLoader CnC Domain in SNI
suricata: ET MALWARE Observed ZLoader CnC Domain in SNI
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1856 wrote to memory of 2032 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 2032 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 2032 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 2032 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 2032 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 2032 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 2032 1856 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\168af6b70609e45a8be1891659d23c70154e940a6fd7f9daf6f8e9bd5192c0c7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\168af6b70609e45a8be1891659d23c70154e940a6fd7f9daf6f8e9bd5192c0c7.dll,#12⤵PID:2032
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:568