Analysis
-
max time kernel
124s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 10:15
Static task
static1
Behavioral task
behavioral1
Sample
630c098ef8211c05e0e68008bcbed6e4402e580e9538817b56084dc301954426.dll
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
630c098ef8211c05e0e68008bcbed6e4402e580e9538817b56084dc301954426.dll
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
630c098ef8211c05e0e68008bcbed6e4402e580e9538817b56084dc301954426.dll
-
Size
238KB
-
MD5
066f72a55a261f84c8c22bb1a18309e3
-
SHA1
144cf2e0dde280f287b0b4e634c31c12590e74c3
-
SHA256
630c098ef8211c05e0e68008bcbed6e4402e580e9538817b56084dc301954426
-
SHA512
52a9f9e86f5a99117e4d83435553a4dfc49192bef701900dbb01b6eda3b73a286be13378d549b5a7b7c0e75bba1932e20019dfefcbdce4ab023a005698951197
Malware Config
Extracted
Family
zloader
Botnet
mainspam
Campaign
Main300k
C2
https://basisroot.online/put.php
Attributes
-
build_id
37
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 796 1760 regsvr32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 796 msiexec.exe Token: SeSecurityPrivilege 796 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1760 1088 regsvr32.exe 27 PID 1088 wrote to memory of 1760 1088 regsvr32.exe 27 PID 1088 wrote to memory of 1760 1088 regsvr32.exe 27 PID 1088 wrote to memory of 1760 1088 regsvr32.exe 27 PID 1088 wrote to memory of 1760 1088 regsvr32.exe 27 PID 1088 wrote to memory of 1760 1088 regsvr32.exe 27 PID 1088 wrote to memory of 1760 1088 regsvr32.exe 27 PID 1760 wrote to memory of 796 1760 regsvr32.exe 30 PID 1760 wrote to memory of 796 1760 regsvr32.exe 30 PID 1760 wrote to memory of 796 1760 regsvr32.exe 30 PID 1760 wrote to memory of 796 1760 regsvr32.exe 30 PID 1760 wrote to memory of 796 1760 regsvr32.exe 30 PID 1760 wrote to memory of 796 1760 regsvr32.exe 30 PID 1760 wrote to memory of 796 1760 regsvr32.exe 30 PID 1760 wrote to memory of 796 1760 regsvr32.exe 30 PID 1760 wrote to memory of 796 1760 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\630c098ef8211c05e0e68008bcbed6e4402e580e9538817b56084dc301954426.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\630c098ef8211c05e0e68008bcbed6e4402e580e9538817b56084dc301954426.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-