Analysis
-
max time kernel
154s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
08-02-2022 22:09
Static task
static1
Behavioral task
behavioral1
Sample
be6c43eb0c59b6f752d2c237fccb0e91523e50423057ccf0c17121584bdf3fed.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
be6c43eb0c59b6f752d2c237fccb0e91523e50423057ccf0c17121584bdf3fed.dll
Resource
win10v2004-en-20220113
General
-
Target
be6c43eb0c59b6f752d2c237fccb0e91523e50423057ccf0c17121584bdf3fed.dll
-
Size
506KB
-
MD5
6fc31eeb82459891900975bdf5d7b789
-
SHA1
5f7717ca5a41d29859327b0341fa8246ec54a936
-
SHA256
be6c43eb0c59b6f752d2c237fccb0e91523e50423057ccf0c17121584bdf3fed
-
SHA512
828150dfc6892ab3c6fff0d103aa0b4f4297ce24dabd48354699ad2e6e20ee1dbedc6e8b2bc45a145c91bb8196dd2be6f0a4af382524a04bb8dc0032d2821244
Malware Config
Extracted
zloader
googleaktualizacija
googleaktualizacija2
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
-
build_id
156
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2620 wrote to memory of 1320 2620 rundll32.exe 81 PID 2620 wrote to memory of 1320 2620 rundll32.exe 81 PID 2620 wrote to memory of 1320 2620 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be6c43eb0c59b6f752d2c237fccb0e91523e50423057ccf0c17121584bdf3fed.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be6c43eb0c59b6f752d2c237fccb0e91523e50423057ccf0c17121584bdf3fed.dll,#12⤵PID:1320
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:1336