Analysis
-
max time kernel
56s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
06-01-2022 12:26
Static task
static1
Behavioral task
behavioral1
Sample
us12.23.dll
Resource
win7-en-20211208
General
-
Target
us12.23.dll
-
Size
1.9MB
-
MD5
1b4eb327a40a14ac4afa627125b63056
-
SHA1
2c0bc274bc2fd9dab82330b837711355170fc606
-
SHA256
034f61d86de99210eb32a2dca27a3ad883f54750c46cdec4fcc53050b2f716eb
-
SHA512
b94770dbf4339677dde0583f0da87bba1fb1c5c0eb028f1697976b24d6298ed43a2d2d1062c8c13a569a3db3032856a37d640a94fe4461986c2d44d1c4c4c819
Malware Config
Extracted
zloader
9092us
9092us
https://asdfghdsajkl.com/gate.php
https://lkjhgfgsdshja.com/gate.php
https://kjdhsasghjds.com/gate.php
https://kdjwhqejqwij.com/gate.php
https://iasudjghnasd.com/gate.php
https://daksjuggdhwa.com/gate.php
https://dkisuaggdjhna.com/gate.php
https://eiqwuggejqw.com/gate.php
https://dquggwjhdmq.com/gate.php
https://djshggadasj.com/gate.php
-
build_id
157
Extracted
zloader
personal
personal
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
-
build_id
157
Signatures
-
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 2408 net.exe 3924 net.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1228 ipconfig.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2520 2416 regsvr32.exe 68 PID 2416 wrote to memory of 2520 2416 regsvr32.exe 68 PID 2416 wrote to memory of 2520 2416 regsvr32.exe 68
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\us12.23.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\us12.23.dll2⤵PID:2520
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:1324
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵PID:404
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Gathers network information
PID:1228
-
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List4⤵PID:1108
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵PID:1860
-
C:\Windows\SysWOW64\net.exenet config workstation5⤵PID:3168
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:2552
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵PID:3028
-
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵PID:4068
-
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:3924
-
-
-
-