Analysis
-
max time kernel
79s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
07-12-2021 04:13
Static task
static1
Behavioral task
behavioral1
Sample
ca.dll
Resource
win7-en-20211014
General
-
Target
ca.dll
-
Size
1.7MB
-
MD5
ca0376cce08c82a5d4c476c4922c4779
-
SHA1
99644ab0f8d4dde1eb11b7ff88ebd66b21d73f24
-
SHA256
f0b6c677bac2de611e0866e849cebd64ec5454885fdd7be5bf0c1c5a17846e3a
-
SHA512
80ad7465be9cfb1e9eabe46e7218c28ffdb71c75b055b9f196f33ac70c3ec80c1e4e9b9ada03d6e4b49415ad1dcea81b2b343df52851f0c2c528131725405813
Malware Config
Extracted
zloader
return
return
https://asdfghdsajkl.com/gate.php
https://lkjhgfgsdshja.com/gate.php
https://kjdhsasghjds.com/gate.php
https://kdjwhqejqwij.com/gate.php
https://iasudjghnasd.com/gate.php
https://daksjuggdhwa.com/gate.php
https://dkisuaggdjhna.com/gate.php
https://eiqwuggejqw.com/gate.php
https://dquggwjhdmq.com/gate.php
https://djshggadasj.com/gate.php
-
build_id
157
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3520 wrote to memory of 3996 3520 rundll32.exe rundll32.exe PID 3520 wrote to memory of 3996 3520 rundll32.exe rundll32.exe PID 3520 wrote to memory of 3996 3520 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca.dll,#12⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1924-121-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1924-122-0x0000000000000000-mapping.dmp
-
memory/1924-123-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/1924-124-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/1924-125-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/3996-118-0x0000000000000000-mapping.dmp
-
memory/3996-119-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/3996-120-0x0000000010000000-0x00000000101C8000-memory.dmpFilesize
1.8MB