Analysis
-
max time kernel
39s -
max time network
137s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
05-01-2022 18:26
Static task
static1
Behavioral task
behavioral1
Sample
us.dll
Resource
win7-en-20211208
General
-
Target
us.dll
-
Size
2.2MB
-
MD5
d2ab32cb696a12c4d3411d2712272d98
-
SHA1
fb2ba905ea5340fe06734924953a1333fae9385b
-
SHA256
c12fdcad28de4408e7fd22c39ba6a1c6bc592fb1c1a61a83aaa59893c103c3f0
-
SHA512
3027118fe1bdc127c44bf25b72dd076e850e81e96c92810ca46b8e80bd29223527ba8cbd71908e66cf0a72a55bfbf59934260f9442822b8e1de85844e66be856
Malware Config
Extracted
zloader
9092us
9092us
https://asdfghdsajkl.com/gate.php
https://lkjhgfgsdshja.com/gate.php
https://kjdhsasghjds.com/gate.php
https://kdjwhqejqwij.com/gate.php
https://iasudjghnasd.com/gate.php
https://daksjuggdhwa.com/gate.php
https://dkisuaggdjhna.com/gate.php
https://eiqwuggejqw.com/gate.php
https://dquggwjhdmq.com/gate.php
https://djshggadasj.com/gate.php
-
build_id
157
Extracted
zloader
personal
personal
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
-
build_id
157
Signatures
-
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 480 ipconfig.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2756 wrote to memory of 2776 2756 regsvr32.exe regsvr32.exe PID 2756 wrote to memory of 2776 2756 regsvr32.exe regsvr32.exe PID 2756 wrote to memory of 2776 2756 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\us.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\us.dll2⤵PID:2776
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:4040
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵PID:1324
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Gathers network information
PID:480 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List4⤵PID:4012
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵PID:1140
-
C:\Windows\SysWOW64\net.exenet config workstation5⤵PID:596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:2448
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵PID:1156
-
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:1420 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵PID:1792
-
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:2156