Resubmissions
05-02-2022 12:51
220205-p3t8gsbeb2 10Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 12:51
Static task
static1
Behavioral task
behavioral1
Sample
915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll
Resource
win10v2004-en-20220113
General
-
Target
915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll
-
Size
421KB
-
MD5
897827f98772919254d6b257d8b8fc11
-
SHA1
3752186f6b38c55aa49aa9cbc895fbbe4328b869
-
SHA256
915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df
-
SHA512
e0a82d23955bbb9716f5fabf6007e9086d466aac2f0606347bf4234e16119bbfe8b9cb45ef3ba7a93acd9f915785245c383f53d1c662dfe2253d26c5f6e92bba
Malware Config
Extracted
zloader
April23Fixed
April23Fixed
http://wmwifbajxxbcxmucxmlc.com/post.php
http://onfovdaqqrwbvdfoqnof.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
-
build_id
120
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1192 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 1192 2028 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1192 msiexec.exe Token: SeSecurityPrivilege 1192 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2028 2024 rundll32.exe 27 PID 2024 wrote to memory of 2028 2024 rundll32.exe 27 PID 2024 wrote to memory of 2028 2024 rundll32.exe 27 PID 2024 wrote to memory of 2028 2024 rundll32.exe 27 PID 2024 wrote to memory of 2028 2024 rundll32.exe 27 PID 2024 wrote to memory of 2028 2024 rundll32.exe 27 PID 2024 wrote to memory of 2028 2024 rundll32.exe 27 PID 2028 wrote to memory of 1192 2028 rundll32.exe 30 PID 2028 wrote to memory of 1192 2028 rundll32.exe 30 PID 2028 wrote to memory of 1192 2028 rundll32.exe 30 PID 2028 wrote to memory of 1192 2028 rundll32.exe 30 PID 2028 wrote to memory of 1192 2028 rundll32.exe 30 PID 2028 wrote to memory of 1192 2028 rundll32.exe 30 PID 2028 wrote to memory of 1192 2028 rundll32.exe 30 PID 2028 wrote to memory of 1192 2028 rundll32.exe 30 PID 2028 wrote to memory of 1192 2028 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\915fcafe990b9110a4e0994d37f8beda66e80aba5174e686bc1d4de13836a7df.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-