Analysis
-
max time kernel
75s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
07-12-2021 04:10
Static task
static1
Behavioral task
behavioral1
Sample
us.dll
Resource
win7-en-20211014
General
-
Target
us.dll
-
Size
507KB
-
MD5
e37ed649a3777bff725e4a0074a9c8e3
-
SHA1
7a57118ee3122c9bdb45cf7a9b2efd72fe258771
-
SHA256
dbc9134eea10cc88289908e112cde9a69334c779a3a659da17d3656f48a7f844
-
SHA512
62ac3aad9932a3159c02ef66b7da48c7f4d596e936dc67afe8902554cfc3fbab71c21419b95c67617222f06747f96a9906d280a4049c82a2f9bbab769739c569
Malware Config
Extracted
zloader
9092us
9092us
https://asdfghdsajkl.com/gate.php
https://lkjhgfgsdshja.com/gate.php
https://kjdhsasghjds.com/gate.php
https://kdjwhqejqwij.com/gate.php
https://iasudjghnasd.com/gate.php
https://daksjuggdhwa.com/gate.php
https://dkisuaggdjhna.com/gate.php
https://eiqwuggejqw.com/gate.php
https://dquggwjhdmq.com/gate.php
https://djshggadasj.com/gate.php
-
build_id
157
Extracted
zloader
personal
personal
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
-
build_id
157
Signatures
-
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 376 ipconfig.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1912 wrote to memory of 3884 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 3884 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 3884 1912 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\us.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\us.dll2⤵PID:3884
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:600
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵PID:3968
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Gathers network information
PID:376 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List4⤵PID:3928
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵PID:1292
-
C:\Windows\SysWOW64\net.exenet config workstation5⤵PID:1604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:1784
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵PID:2084
-
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵PID:3244
-
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:3556