Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    05-02-2022 07:19

General

  • Target

    fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306.dll

  • Size

    408KB

  • MD5

    2fa4f74d7a863c65769becdb7e81a752

  • SHA1

    3797c53fc81d27f6e4ef041323bb6c8d38888b88

  • SHA256

    fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306

  • SHA512

    e11cb310ec51b24b274434b0ec08f4ec1d7f8e6b2753fa2d89cf51c49b0511ea25d4b0a5750d68f6b0f28840ac67ce9e02eb039b12e729c66ae11786834cc1bf

Malware Config

Extracted

Family

zloader

Botnet

miguel

Campaign

21/04

C2

https://glsunzdf.casa/wp-config.php

https://xaprgnve.icu/wp-config.php

Attributes
  • build_id

    166

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1032-57-0x0000000000090000-0x00000000000C4000-memory.dmp

    Filesize

    208KB

  • memory/1032-58-0x00000000000D0000-0x00000000000D1000-memory.dmp

    Filesize

    4KB

  • memory/1032-59-0x0000000000090000-0x00000000000C4000-memory.dmp

    Filesize

    208KB

  • memory/1032-61-0x0000000000090000-0x00000000000C4000-memory.dmp

    Filesize

    208KB

  • memory/1436-53-0x0000000076151000-0x0000000076153000-memory.dmp

    Filesize

    8KB

  • memory/1436-54-0x0000000010000000-0x0000000010034000-memory.dmp

    Filesize

    208KB

  • memory/1436-55-0x0000000010000000-0x0000000010F6E000-memory.dmp

    Filesize

    15.4MB

  • memory/1436-56-0x00000000000D0000-0x00000000000D1000-memory.dmp

    Filesize

    4KB