Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306.dll
Resource
win10v2004-en-20220113
General
-
Target
fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306.dll
-
Size
408KB
-
MD5
2fa4f74d7a863c65769becdb7e81a752
-
SHA1
3797c53fc81d27f6e4ef041323bb6c8d38888b88
-
SHA256
fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306
-
SHA512
e11cb310ec51b24b274434b0ec08f4ec1d7f8e6b2753fa2d89cf51c49b0511ea25d4b0a5750d68f6b0f28840ac67ce9e02eb039b12e729c66ae11786834cc1bf
Malware Config
Extracted
zloader
miguel
21/04
https://glsunzdf.casa/wp-config.php
https://xaprgnve.icu/wp-config.php
-
build_id
166
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1436 set thread context of 1032 1436 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1032 msiexec.exe Token: SeSecurityPrivilege 1032 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1436 1344 rundll32.exe 27 PID 1344 wrote to memory of 1436 1344 rundll32.exe 27 PID 1344 wrote to memory of 1436 1344 rundll32.exe 27 PID 1344 wrote to memory of 1436 1344 rundll32.exe 27 PID 1344 wrote to memory of 1436 1344 rundll32.exe 27 PID 1344 wrote to memory of 1436 1344 rundll32.exe 27 PID 1344 wrote to memory of 1436 1344 rundll32.exe 27 PID 1436 wrote to memory of 1032 1436 rundll32.exe 30 PID 1436 wrote to memory of 1032 1436 rundll32.exe 30 PID 1436 wrote to memory of 1032 1436 rundll32.exe 30 PID 1436 wrote to memory of 1032 1436 rundll32.exe 30 PID 1436 wrote to memory of 1032 1436 rundll32.exe 30 PID 1436 wrote to memory of 1032 1436 rundll32.exe 30 PID 1436 wrote to memory of 1032 1436 rundll32.exe 30 PID 1436 wrote to memory of 1032 1436 rundll32.exe 30 PID 1436 wrote to memory of 1032 1436 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fffd7bc61eb5b9759a97699efdf9455b76d9e198b87d75ebdb8a2fa2a4a08306.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-