Analysis

  • max time kernel
    152s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 10:27

General

  • Target

    4b3ff2b99ed45563241abdf5079986e2e895ff7a011a2530e6ab9da20fa14954.exe

  • Size

    260KB

  • MD5

    b45802e885542ea5f4bf5f3fe11b01cf

  • SHA1

    cb41a9cdfd28a228f6bc3c5d5f857ec4389e7ffc

  • SHA256

    4b3ff2b99ed45563241abdf5079986e2e895ff7a011a2530e6ab9da20fa14954

  • SHA512

    33a89ec1a0584dc7bcdb837915415c5cb0b7d1eb9b570ff5e624827e18c5135aa12944ff9b6c1056723de4b2280cd433cc986daedd3d1f0a373cf5b3f123c1ee

Score
10/10

Malware Config

Extracted

Family

zloader

Attributes
  • build_id

    13

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b3ff2b99ed45563241abdf5079986e2e895ff7a011a2530e6ab9da20fa14954.exe
    "C:\Users\Admin\AppData\Local\Temp\4b3ff2b99ed45563241abdf5079986e2e895ff7a011a2530e6ab9da20fa14954.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1388-55-0x00000000758A1000-0x00000000758A3000-memory.dmp

    Filesize

    8KB

  • memory/1388-56-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1388-57-0x00000000002A0000-0x00000000002CC000-memory.dmp

    Filesize

    176KB

  • memory/1644-58-0x0000000000090000-0x00000000000BC000-memory.dmp

    Filesize

    176KB

  • memory/1644-59-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB

  • memory/1644-60-0x0000000000090000-0x00000000000BC000-memory.dmp

    Filesize

    176KB

  • memory/1644-62-0x0000000000090000-0x00000000000BC000-memory.dmp

    Filesize

    176KB