Analysis

  • max time kernel
    130s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 10:52

General

  • Target

    16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll

  • Size

    310KB

  • MD5

    b9d425b1970b5fd03aed67053d97916d

  • SHA1

    6b198494ce7d94fe26e72f4d0de776c897d9231a

  • SHA256

    16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c

  • SHA512

    621449a17709fb703c18e84b31956a1fefd7a0204743061c401f7208a12c9a51df6f60eee0be155ca290d0336e46b7fdef8eaa4267dc8147916f43d824cb989d

Malware Config

Extracted

Family

zloader

Botnet

banking

Campaign

banking

C2

https://iloveyoubaby1.pro/gate.php

https://idsakjfsanfaskj.com/gate.php

https://fslakdasjdnsasjsj.com/gate.php

https://dksadjsahnfaskmsa.com/gate.php

https://dskdsajdsahda.info/gate.php

https://dskdsajdsadasda.info/gate.php

https://dskjdsadhsahjsas.info/gate.php

https://dsjadjsadjsadjafsa.info/gate.php

https://fsakjdsafasifkajfaf.pro/gate.php

https://djsadhsadsadjashs.pro/gate.php

Attributes
  • build_id

    2

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Blocklisted process makes network request 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\16464a294fc276ea38e4f8aedd7fa6d1f426036d42b342bde27bdc63b5c6658c.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Blocklisted process makes network request
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2012

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/828-55-0x0000000076071000-0x0000000076073000-memory.dmp
    Filesize

    8KB

  • memory/828-60-0x00000000005A0000-0x00000000005EF000-memory.dmp
    Filesize

    316KB

  • memory/2012-57-0x00000000000C0000-0x00000000000C1000-memory.dmp
    Filesize

    4KB

  • memory/2012-56-0x0000000000090000-0x00000000000BC000-memory.dmp
    Filesize

    176KB

  • memory/2012-58-0x0000000000090000-0x00000000000BC000-memory.dmp
    Filesize

    176KB

  • memory/2012-61-0x0000000000090000-0x00000000000BC000-memory.dmp
    Filesize

    176KB