Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 08:17
Static task
static1
Behavioral task
behavioral1
Sample
ee304588666deeca692b1b03be4b69ff4fd5484334ba9d5ea8da8d8ae2464fb7.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ee304588666deeca692b1b03be4b69ff4fd5484334ba9d5ea8da8d8ae2464fb7.dll
Resource
win10v2004-en-20220113
General
-
Target
ee304588666deeca692b1b03be4b69ff4fd5484334ba9d5ea8da8d8ae2464fb7.dll
-
Size
539KB
-
MD5
2bc2b695d5b27df05bbd86fa6feec860
-
SHA1
b1250a0a1c881f74f81c518c64dbca41bebaf62d
-
SHA256
ee304588666deeca692b1b03be4b69ff4fd5484334ba9d5ea8da8d8ae2464fb7
-
SHA512
de669b3bdbdcc56948d9eb32be4cba6a06cc41db33d557b5b080d64583affb6f51ae6b7d10510b50847cb33484952d7e7ae6ce88f319d82925b9bebacea01e2c
Malware Config
Extracted
zloader
Apr14
Spam
http://wmwifbajxxbcxmucxmlc.com/post.php
http://ojnxjgfjlftfkkuxxiqd.com/post.php
http://pwkqhdgytsshkoibaake.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fyratyubvflktyyjiqgq.com/post.php
-
build_id
102
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 744 set thread context of 756 744 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 756 msiexec.exe Token: SeSecurityPrivilege 756 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1200 wrote to memory of 744 1200 rundll32.exe 27 PID 1200 wrote to memory of 744 1200 rundll32.exe 27 PID 1200 wrote to memory of 744 1200 rundll32.exe 27 PID 1200 wrote to memory of 744 1200 rundll32.exe 27 PID 1200 wrote to memory of 744 1200 rundll32.exe 27 PID 1200 wrote to memory of 744 1200 rundll32.exe 27 PID 1200 wrote to memory of 744 1200 rundll32.exe 27 PID 744 wrote to memory of 756 744 rundll32.exe 30 PID 744 wrote to memory of 756 744 rundll32.exe 30 PID 744 wrote to memory of 756 744 rundll32.exe 30 PID 744 wrote to memory of 756 744 rundll32.exe 30 PID 744 wrote to memory of 756 744 rundll32.exe 30 PID 744 wrote to memory of 756 744 rundll32.exe 30 PID 744 wrote to memory of 756 744 rundll32.exe 30 PID 744 wrote to memory of 756 744 rundll32.exe 30 PID 744 wrote to memory of 756 744 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee304588666deeca692b1b03be4b69ff4fd5484334ba9d5ea8da8d8ae2464fb7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee304588666deeca692b1b03be4b69ff4fd5484334ba9d5ea8da8d8ae2464fb7.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-