Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 16:42
Static task
static1
Behavioral task
behavioral1
Sample
3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll
Resource
win10v2004-en-20220113
General
-
Target
3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll
-
Size
421KB
-
MD5
061506b2a0a26fbd20dba69a1105e1b7
-
SHA1
a4f4bc27be3da2b85a06883615bb96b8a2a79ebb
-
SHA256
3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9
-
SHA512
4426c072cb52f2e4ce35ca88c4f20304145d017b5e95f2d35aa68216691b6abde99b6941e1067e50b77342300dea329cb0facbc5ab391272ced658dcf5ee2be9
Malware Config
Extracted
zloader
April23Fixed
April23Fixed
http://wmwifbajxxbcxmucxmlc.com/post.php
http://onfovdaqqrwbvdfoqnof.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
-
build_id
120
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 660 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 660 2040 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 660 msiexec.exe Token: SeSecurityPrivilege 660 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2040 2028 rundll32.exe 27 PID 2028 wrote to memory of 2040 2028 rundll32.exe 27 PID 2028 wrote to memory of 2040 2028 rundll32.exe 27 PID 2028 wrote to memory of 2040 2028 rundll32.exe 27 PID 2028 wrote to memory of 2040 2028 rundll32.exe 27 PID 2028 wrote to memory of 2040 2028 rundll32.exe 27 PID 2028 wrote to memory of 2040 2028 rundll32.exe 27 PID 2040 wrote to memory of 660 2040 rundll32.exe 30 PID 2040 wrote to memory of 660 2040 rundll32.exe 30 PID 2040 wrote to memory of 660 2040 rundll32.exe 30 PID 2040 wrote to memory of 660 2040 rundll32.exe 30 PID 2040 wrote to memory of 660 2040 rundll32.exe 30 PID 2040 wrote to memory of 660 2040 rundll32.exe 30 PID 2040 wrote to memory of 660 2040 rundll32.exe 30 PID 2040 wrote to memory of 660 2040 rundll32.exe 30 PID 2040 wrote to memory of 660 2040 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-