Analysis

  • max time kernel
    133s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    05/02/2022, 19:46 UTC

General

  • Target

    096dda9c010522a17fbdbfda2caa8b3a3d88aecafd0287df082f2ca30fcc0e8a.dll

  • Size

    561KB

  • MD5

    e4e774e20da79849080fdf2496d99b74

  • SHA1

    82dd2256410720084bdddd8b53c910149861f644

  • SHA256

    096dda9c010522a17fbdbfda2caa8b3a3d88aecafd0287df082f2ca30fcc0e8a

  • SHA512

    3697288d7ecddca6629e53fb88af0e8f147bd67b7385de588da3ecbf0b1cbc7cecabb2e1614c36a042d6b123551e2cd15646dfdca257aabebcb8788c768459c3

Malware Config

Extracted

Family

zloader

Botnet

08/04

C2

https://kuaxbdkvbbmivbxkrrev.com/wp-config.php

https://hwbblyyrb.pw/wp-config.php

Attributes
  • build_id

    134

rc4.plain
1
41997b4a729e1a0175208305170752dd

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\096dda9c010522a17fbdbfda2caa8b3a3d88aecafd0287df082f2ca30fcc0e8a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\096dda9c010522a17fbdbfda2caa8b3a3d88aecafd0287df082f2ca30fcc0e8a.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/524-59-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/524-58-0x0000000000110000-0x0000000000143000-memory.dmp

    Filesize

    204KB

  • memory/524-60-0x0000000000110000-0x0000000000143000-memory.dmp

    Filesize

    204KB

  • memory/524-62-0x0000000000110000-0x0000000000143000-memory.dmp

    Filesize

    204KB

  • memory/1432-54-0x0000000075D11000-0x0000000075D13000-memory.dmp

    Filesize

    8KB

  • memory/1432-56-0x0000000075440000-0x00000000754EC000-memory.dmp

    Filesize

    688KB

  • memory/1432-55-0x0000000075440000-0x0000000075473000-memory.dmp

    Filesize

    204KB

  • memory/1432-57-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.