Analysis

  • max time kernel
    117s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 04:10

General

  • Target

    be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb.vbs

  • Size

    1.0MB

  • MD5

    7e8c741445cde9246b96c96a9cb89cd1

  • SHA1

    93409daece5165c0916e4e45d4c62292f57b34db

  • SHA256

    be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb

  • SHA512

    6d27fefa6c01fc07cd5d7ea2d69f9a061ac6438327dec2b1474316c0601ed3f7baeeb37b1fcfac0128274bec9d50f27e5006364006f419927de499cd159a411a

Malware Config

Extracted

Family

zloader

Botnet

main

Campaign

29.03.2020

C2

https://postgringos.com/sound.php

https://tetraslims.com/sound.php

https://greenrumba.com/sound.php

https://starterdatas.com/sound.php

https://nexycombats.com/sound.php

https://peermems.com/sound.php

https://fotonums.com/sound.php

https://hibsurf.com/sound.php

https://buhismus.com/sound.php

https://spensores.com/sound.php

Attributes
  • build_id

    30

rc4.plain

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb.vbs"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1632
  • C:\Windows\system32\rundll32.exe
    rundll32 C:\Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe,DllRegisterServer
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 C:\Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe,DllRegisterServer
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:1860

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe
    MD5

    24f98dee17042e0bd3f723f7bbfa839f

    SHA1

    10123cbacb225b078c8e0a847da9e020bc0119e1

    SHA256

    8542bf1c3c7532f11fc39b4b6a20a08ef5bd0c8d42e3262028d4ffdbc5aa88f8

    SHA512

    0db0794e2547015695e40db1d419c944f1d955aa3f3ae3b673900f995b9a45126097f4a6a6029dbe7bfb87ed694bc024f720b05172332b1f41a8600a8bfd3b6f

  • \Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe
    MD5

    24f98dee17042e0bd3f723f7bbfa839f

    SHA1

    10123cbacb225b078c8e0a847da9e020bc0119e1

    SHA256

    8542bf1c3c7532f11fc39b4b6a20a08ef5bd0c8d42e3262028d4ffdbc5aa88f8

    SHA512

    0db0794e2547015695e40db1d419c944f1d955aa3f3ae3b673900f995b9a45126097f4a6a6029dbe7bfb87ed694bc024f720b05172332b1f41a8600a8bfd3b6f

  • \Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe
    MD5

    24f98dee17042e0bd3f723f7bbfa839f

    SHA1

    10123cbacb225b078c8e0a847da9e020bc0119e1

    SHA256

    8542bf1c3c7532f11fc39b4b6a20a08ef5bd0c8d42e3262028d4ffdbc5aa88f8

    SHA512

    0db0794e2547015695e40db1d419c944f1d955aa3f3ae3b673900f995b9a45126097f4a6a6029dbe7bfb87ed694bc024f720b05172332b1f41a8600a8bfd3b6f

  • \Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe
    MD5

    24f98dee17042e0bd3f723f7bbfa839f

    SHA1

    10123cbacb225b078c8e0a847da9e020bc0119e1

    SHA256

    8542bf1c3c7532f11fc39b4b6a20a08ef5bd0c8d42e3262028d4ffdbc5aa88f8

    SHA512

    0db0794e2547015695e40db1d419c944f1d955aa3f3ae3b673900f995b9a45126097f4a6a6029dbe7bfb87ed694bc024f720b05172332b1f41a8600a8bfd3b6f

  • \Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe
    MD5

    24f98dee17042e0bd3f723f7bbfa839f

    SHA1

    10123cbacb225b078c8e0a847da9e020bc0119e1

    SHA256

    8542bf1c3c7532f11fc39b4b6a20a08ef5bd0c8d42e3262028d4ffdbc5aa88f8

    SHA512

    0db0794e2547015695e40db1d419c944f1d955aa3f3ae3b673900f995b9a45126097f4a6a6029dbe7bfb87ed694bc024f720b05172332b1f41a8600a8bfd3b6f

  • memory/1532-57-0x00000000763F1000-0x00000000763F3000-memory.dmp
    Filesize

    8KB

  • memory/1532-62-0x0000000000680000-0x00000000006CD000-memory.dmp
    Filesize

    308KB

  • memory/1532-63-0x0000000010000000-0x00000000100D6000-memory.dmp
    Filesize

    856KB

  • memory/1632-54-0x000007FEFC031000-0x000007FEFC033000-memory.dmp
    Filesize

    8KB

  • memory/1632-55-0x0000000001ED0000-0x0000000001ED1000-memory.dmp
    Filesize

    4KB

  • memory/1860-65-0x0000000000090000-0x00000000000C1000-memory.dmp
    Filesize

    196KB

  • memory/1860-64-0x0000000000090000-0x00000000000C0000-memory.dmp
    Filesize

    192KB

  • memory/1860-66-0x0000000000090000-0x00000000000C1000-memory.dmp
    Filesize

    196KB

  • memory/1860-68-0x0000000000090000-0x00000000000C0000-memory.dmp
    Filesize

    192KB