Analysis

  • max time kernel
    133s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    05-02-2022 19:46

General

  • Target

    096dda9c010522a17fbdbfda2caa8b3a3d88aecafd0287df082f2ca30fcc0e8a.dll

  • Size

    561KB

  • MD5

    e4e774e20da79849080fdf2496d99b74

  • SHA1

    82dd2256410720084bdddd8b53c910149861f644

  • SHA256

    096dda9c010522a17fbdbfda2caa8b3a3d88aecafd0287df082f2ca30fcc0e8a

  • SHA512

    3697288d7ecddca6629e53fb88af0e8f147bd67b7385de588da3ecbf0b1cbc7cecabb2e1614c36a042d6b123551e2cd15646dfdca257aabebcb8788c768459c3

Malware Config

Extracted

Family

zloader

Botnet

08/04

C2

https://kuaxbdkvbbmivbxkrrev.com/wp-config.php

https://hwbblyyrb.pw/wp-config.php

Attributes
  • build_id

    134

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\096dda9c010522a17fbdbfda2caa8b3a3d88aecafd0287df082f2ca30fcc0e8a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\096dda9c010522a17fbdbfda2caa8b3a3d88aecafd0287df082f2ca30fcc0e8a.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/524-59-0x0000000000150000-0x0000000000151000-memory.dmp
    Filesize

    4KB

  • memory/524-58-0x0000000000110000-0x0000000000143000-memory.dmp
    Filesize

    204KB

  • memory/524-60-0x0000000000110000-0x0000000000143000-memory.dmp
    Filesize

    204KB

  • memory/524-62-0x0000000000110000-0x0000000000143000-memory.dmp
    Filesize

    204KB

  • memory/1432-54-0x0000000075D11000-0x0000000075D13000-memory.dmp
    Filesize

    8KB

  • memory/1432-56-0x0000000075440000-0x00000000754EC000-memory.dmp
    Filesize

    688KB

  • memory/1432-55-0x0000000075440000-0x0000000075473000-memory.dmp
    Filesize

    204KB

  • memory/1432-57-0x0000000000180000-0x0000000000181000-memory.dmp
    Filesize

    4KB