Analysis
-
max time kernel
48s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-01-2022 10:54
Static task
static1
Behavioral task
behavioral1
Sample
ca.dll
Resource
win7-en-20211208
General
-
Target
ca.dll
-
Size
1.7MB
-
MD5
ca0376cce08c82a5d4c476c4922c4779
-
SHA1
99644ab0f8d4dde1eb11b7ff88ebd66b21d73f24
-
SHA256
f0b6c677bac2de611e0866e849cebd64ec5454885fdd7be5bf0c1c5a17846e3a
-
SHA512
80ad7465be9cfb1e9eabe46e7218c28ffdb71c75b055b9f196f33ac70c3ec80c1e4e9b9ada03d6e4b49415ad1dcea81b2b343df52851f0c2c528131725405813
Malware Config
Extracted
zloader
return
return
https://asdfghdsajkl.com/gate.php
https://lkjhgfgsdshja.com/gate.php
https://kjdhsasghjds.com/gate.php
https://kdjwhqejqwij.com/gate.php
https://iasudjghnasd.com/gate.php
https://daksjuggdhwa.com/gate.php
https://dkisuaggdjhna.com/gate.php
https://eiqwuggejqw.com/gate.php
https://dquggwjhdmq.com/gate.php
https://djshggadasj.com/gate.php
-
build_id
157
Extracted
zloader
personal
personal
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
-
build_id
157
Signatures
-
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1664 ipconfig.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1928 wrote to memory of 1116 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1116 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1116 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1116 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1116 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1116 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1116 1928 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca.dll,#12⤵PID:1116
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:540
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵PID:1732
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Gathers network information
PID:1664 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List4⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵PID:1728
-
C:\Windows\SysWOW64\net.exenet config workstation5⤵PID:1980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:596
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵PID:1928
-
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:1896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵PID:108
-
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:112