Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 03:36

General

  • Target

    da164dc8c1baf31539335b6a14ca2f14cc0f8a4a39523479290437d0810b82e3.dll

  • Size

    788KB

  • MD5

    25c4f6ec3f18c71bf9639746b8fe9567

  • SHA1

    9ff48900feed1f2433b3ef1610a5fc2b438152de

  • SHA256

    da164dc8c1baf31539335b6a14ca2f14cc0f8a4a39523479290437d0810b82e3

  • SHA512

    35120b078971e74f473d19fc5f65bd4fe925ff05a00dac080b6a98ceeb1409ce6e2b6757d282559f21fe24e9ee8c95e90a5289e30602ab88203cd0432827637e

Malware Config

Extracted

Family

zloader

Botnet

main

Campaign

27.03.2020

C2

https://hustlertest.com/sound.php

https://dandycodes.com/sound.php

https://sandyfotos.com/sound.php

https://postgringos.com/sound.php

https://tetraslims.com/sound.php

https://greenrumba.com/sound.php

https://starterdatas.com/sound.php

https://nexycombats.com/sound.php

https://peermems.com/sound.php

https://fotonums.com/sound.php

Attributes
  • build_id

    29

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\da164dc8c1baf31539335b6a14ca2f14cc0f8a4a39523479290437d0810b82e3.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\da164dc8c1baf31539335b6a14ca2f14cc0f8a4a39523479290437d0810b82e3.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:1216

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/836-55-0x0000000076641000-0x0000000076643000-memory.dmp
    Filesize

    8KB

  • memory/836-56-0x00000000001C0000-0x000000000020D000-memory.dmp
    Filesize

    308KB

  • memory/836-57-0x0000000010000000-0x00000000100C7000-memory.dmp
    Filesize

    796KB

  • memory/1216-59-0x0000000000090000-0x00000000000C1000-memory.dmp
    Filesize

    196KB

  • memory/1216-58-0x0000000000090000-0x00000000000C0000-memory.dmp
    Filesize

    192KB

  • memory/1216-60-0x0000000000090000-0x00000000000C1000-memory.dmp
    Filesize

    196KB

  • memory/1216-62-0x0000000000090000-0x00000000000C0000-memory.dmp
    Filesize

    192KB