Analysis
-
max time kernel
151s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
be3d1522f968ad7cc46a996a64b5e5be8044075f6bd1784046e46671bf416b45.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
be3d1522f968ad7cc46a996a64b5e5be8044075f6bd1784046e46671bf416b45.dll
Resource
win10v2004-en-20220112
General
-
Target
be3d1522f968ad7cc46a996a64b5e5be8044075f6bd1784046e46671bf416b45.dll
-
Size
472KB
-
MD5
f500b424c560f00ccd993a46e4b9fcfa
-
SHA1
d1da2bb6a020462d5d7ac6301395e10d2acb6b17
-
SHA256
be3d1522f968ad7cc46a996a64b5e5be8044075f6bd1784046e46671bf416b45
-
SHA512
65018b4c441db4b618a988cb6d9fa46bcfd2754af244e9d1d309295ba1d2477dd1ea6609214bc7d725b3576b4232c81fa260873357652b89529f0dabd6fd14d0
Malware Config
Extracted
zloader
April24misha
April24misha
http://wmwifbajxxbcxmucxmlc.com/post.php
http://onfovdaqqrwbvdfoqnof.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
-
build_id
122
Signatures
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 336 msiexec.exe 9 336 msiexec.exe 11 336 msiexec.exe 13 336 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 336 2040 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 336 msiexec.exe Token: SeSecurityPrivilege 336 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2040 2036 rundll32.exe 27 PID 2036 wrote to memory of 2040 2036 rundll32.exe 27 PID 2036 wrote to memory of 2040 2036 rundll32.exe 27 PID 2036 wrote to memory of 2040 2036 rundll32.exe 27 PID 2036 wrote to memory of 2040 2036 rundll32.exe 27 PID 2036 wrote to memory of 2040 2036 rundll32.exe 27 PID 2036 wrote to memory of 2040 2036 rundll32.exe 27 PID 2040 wrote to memory of 336 2040 rundll32.exe 30 PID 2040 wrote to memory of 336 2040 rundll32.exe 30 PID 2040 wrote to memory of 336 2040 rundll32.exe 30 PID 2040 wrote to memory of 336 2040 rundll32.exe 30 PID 2040 wrote to memory of 336 2040 rundll32.exe 30 PID 2040 wrote to memory of 336 2040 rundll32.exe 30 PID 2040 wrote to memory of 336 2040 rundll32.exe 30 PID 2040 wrote to memory of 336 2040 rundll32.exe 30 PID 2040 wrote to memory of 336 2040 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be3d1522f968ad7cc46a996a64b5e5be8044075f6bd1784046e46671bf416b45.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be3d1522f968ad7cc46a996a64b5e5be8044075f6bd1784046e46671bf416b45.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-