Analysis
-
max time kernel
134s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-02-2022 04:42
Static task
static1
Behavioral task
behavioral1
Sample
4a9cfd8221644b4405bd77cbde8623e55199e50f315ba1ac9c696e75d04e3ece.dll
Resource
win7-en-20211208
General
-
Target
4a9cfd8221644b4405bd77cbde8623e55199e50f315ba1ac9c696e75d04e3ece.dll
-
Size
1.1MB
-
MD5
d4c65c56fa4bc016c835310778682dd8
-
SHA1
dfd390331c9f0de6c9681466c09e46feff88e7bb
-
SHA256
4a9cfd8221644b4405bd77cbde8623e55199e50f315ba1ac9c696e75d04e3ece
-
SHA512
bdcacb45eb4b2d25ae6c3630e2c2442c843c4688db3be12850d8ff255f29dafda8292e709a9d180938a5e210cac5248d60a951cfe7265f36f596b846af334e8d
Malware Config
Extracted
zloader
Jho
25/05
https://tentrhetarav.gq/wp-parser.php
https://slidirinisprec.ml/wp-parser.php
https://iedison.vip/wp-parser.php
https://financiallifecoaching.com/wp-parser.php
https://fly2go.cn/wp-parser.php
-
build_id
230
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1568 set thread context of 1852 1568 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1852 msiexec.exe Token: SeSecurityPrivilege 1852 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1668 wrote to memory of 1568 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1568 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1568 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1568 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1568 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1568 1668 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1568 1668 rundll32.exe rundll32.exe PID 1568 wrote to memory of 1852 1568 rundll32.exe msiexec.exe PID 1568 wrote to memory of 1852 1568 rundll32.exe msiexec.exe PID 1568 wrote to memory of 1852 1568 rundll32.exe msiexec.exe PID 1568 wrote to memory of 1852 1568 rundll32.exe msiexec.exe PID 1568 wrote to memory of 1852 1568 rundll32.exe msiexec.exe PID 1568 wrote to memory of 1852 1568 rundll32.exe msiexec.exe PID 1568 wrote to memory of 1852 1568 rundll32.exe msiexec.exe PID 1568 wrote to memory of 1852 1568 rundll32.exe msiexec.exe PID 1568 wrote to memory of 1852 1568 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a9cfd8221644b4405bd77cbde8623e55199e50f315ba1ac9c696e75d04e3ece.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a9cfd8221644b4405bd77cbde8623e55199e50f315ba1ac9c696e75d04e3ece.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1568-54-0x0000000075B51000-0x0000000075B53000-memory.dmpFilesize
8KB
-
memory/1568-56-0x00000000744F0000-0x0000000074709000-memory.dmpFilesize
2.1MB
-
memory/1568-55-0x00000000744F0000-0x0000000074525000-memory.dmpFilesize
212KB
-
memory/1568-57-0x00000000745E3000-0x00000000745E6000-memory.dmpFilesize
12KB
-
memory/1568-58-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB
-
memory/1852-59-0x0000000000090000-0x00000000000C5000-memory.dmpFilesize
212KB
-
memory/1852-60-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/1852-61-0x0000000000090000-0x00000000000C5000-memory.dmpFilesize
212KB
-
memory/1852-63-0x0000000000090000-0x00000000000C5000-memory.dmpFilesize
212KB