Analysis
-
max time kernel
155s -
max time network
156s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 09:49
Static task
static1
Behavioral task
behavioral1
Sample
90c0857b9095a1a1f51d94fdbf915e33aee78d510ef0e8674d233fc1223149d7.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
90c0857b9095a1a1f51d94fdbf915e33aee78d510ef0e8674d233fc1223149d7.dll
Resource
win10v2004-en-20220113
General
-
Target
90c0857b9095a1a1f51d94fdbf915e33aee78d510ef0e8674d233fc1223149d7.dll
-
Size
809KB
-
MD5
eeb55d19351258f514e47c03bc30be67
-
SHA1
64c076da46b169c13d1e933f5f420856fe2072dc
-
SHA256
90c0857b9095a1a1f51d94fdbf915e33aee78d510ef0e8674d233fc1223149d7
-
SHA512
6816c30f0338b14fff22ecc064a3e795136cf93c0afeace84a81fa68ff30996a60ff7fa670ad80ab8270b282e00e9c8eef8e4628feccacb62a0954d44321b996
Malware Config
Extracted
zloader
main
2020-06-07
https://matarlod.org/web/data
https://datearoc.org/web/data
https://rechnecy.org/web/data
https://ramissal.org/web/data
https://raidesci.org/web/data
https://glartrot.org/web/data
https://revenapo.org/web/data
https://brenonip.org/web/data
-
build_id
4
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1068 set thread context of 520 1068 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 520 msiexec.exe Token: SeSecurityPrivilege 520 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1068 1744 rundll32.exe 27 PID 1744 wrote to memory of 1068 1744 rundll32.exe 27 PID 1744 wrote to memory of 1068 1744 rundll32.exe 27 PID 1744 wrote to memory of 1068 1744 rundll32.exe 27 PID 1744 wrote to memory of 1068 1744 rundll32.exe 27 PID 1744 wrote to memory of 1068 1744 rundll32.exe 27 PID 1744 wrote to memory of 1068 1744 rundll32.exe 27 PID 1068 wrote to memory of 520 1068 rundll32.exe 30 PID 1068 wrote to memory of 520 1068 rundll32.exe 30 PID 1068 wrote to memory of 520 1068 rundll32.exe 30 PID 1068 wrote to memory of 520 1068 rundll32.exe 30 PID 1068 wrote to memory of 520 1068 rundll32.exe 30 PID 1068 wrote to memory of 520 1068 rundll32.exe 30 PID 1068 wrote to memory of 520 1068 rundll32.exe 30 PID 1068 wrote to memory of 520 1068 rundll32.exe 30 PID 1068 wrote to memory of 520 1068 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90c0857b9095a1a1f51d94fdbf915e33aee78d510ef0e8674d233fc1223149d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90c0857b9095a1a1f51d94fdbf915e33aee78d510ef0e8674d233fc1223149d7.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-