Analysis
-
max time kernel
60s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
06-12-2021 23:14
Static task
static1
Behavioral task
behavioral1
Sample
5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984.dll
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984.dll
Resource
win10-en-20211104
General
-
Target
5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984.dll
-
Size
642KB
-
MD5
5708cab401d3a2dbca16c57d40659a5c
-
SHA1
f366e16d4c556e698f2b35c5b64123069d2b6af1
-
SHA256
5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984
-
SHA512
01687a1aba85533a34a56e88a77b4140699c7dfa9e559cb4e5924db2d414d0f762fed84cc842c740234894fdfd2966c406fcd9e7ef7788dc0927f604fa6230aa
Malware Config
Extracted
zloader
googleaktualizacija
googleaktualizacija1
https://iqowijsdakm.ru/gate.php
https://wiewjdmkfjn.ru/gate.php
https://dksaoidiakjd.su/gate.php
https://iweuiqjdakjd.su/gate.php
https://yuidskadjna.su/gate.php
https://olksmadnbdj.su/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
-
build_id
155
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 836 wrote to memory of 1584 836 rundll32.exe rundll32.exe PID 836 wrote to memory of 1584 836 rundll32.exe rundll32.exe PID 836 wrote to memory of 1584 836 rundll32.exe rundll32.exe PID 836 wrote to memory of 1584 836 rundll32.exe rundll32.exe PID 836 wrote to memory of 1584 836 rundll32.exe rundll32.exe PID 836 wrote to memory of 1584 836 rundll32.exe rundll32.exe PID 836 wrote to memory of 1584 836 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5192df66d6e6bec165322efcb90687347ded916bceb835c95e3191e735029984.dll,#12⤵PID:1584
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:552