Analysis

  • max time kernel
    138s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    13-02-2022 04:42

General

  • Target

    4a9cfd8221644b4405bd77cbde8623e55199e50f315ba1ac9c696e75d04e3ece.dll

  • Size

    1.1MB

  • MD5

    d4c65c56fa4bc016c835310778682dd8

  • SHA1

    dfd390331c9f0de6c9681466c09e46feff88e7bb

  • SHA256

    4a9cfd8221644b4405bd77cbde8623e55199e50f315ba1ac9c696e75d04e3ece

  • SHA512

    bdcacb45eb4b2d25ae6c3630e2c2442c843c4688db3be12850d8ff255f29dafda8292e709a9d180938a5e210cac5248d60a951cfe7265f36f596b846af334e8d

Malware Config

Extracted

Family

zloader

Botnet

Jho

Campaign

25/05

C2

https://tentrhetarav.gq/wp-parser.php

https://slidirinisprec.ml/wp-parser.php

https://iedison.vip/wp-parser.php

https://financiallifecoaching.com/wp-parser.php

https://fly2go.cn/wp-parser.php

Attributes
  • build_id

    230

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4a9cfd8221644b4405bd77cbde8623e55199e50f315ba1ac9c696e75d04e3ece.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4a9cfd8221644b4405bd77cbde8623e55199e50f315ba1ac9c696e75d04e3ece.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4132
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
          PID:1664
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3808
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2160

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1664-137-0x00000000006B0000-0x00000000006E5000-memory.dmp
      Filesize

      212KB

    • memory/1664-138-0x00000000006B0000-0x00000000006E5000-memory.dmp
      Filesize

      212KB

    • memory/3808-130-0x000001CBCAD20000-0x000001CBCAD30000-memory.dmp
      Filesize

      64KB

    • memory/3808-131-0x000001CBCAD80000-0x000001CBCAD90000-memory.dmp
      Filesize

      64KB

    • memory/3808-132-0x000001CBCD460000-0x000001CBCD464000-memory.dmp
      Filesize

      16KB

    • memory/4132-133-0x0000000075470000-0x00000000754A5000-memory.dmp
      Filesize

      212KB

    • memory/4132-134-0x0000000075470000-0x0000000075689000-memory.dmp
      Filesize

      2.1MB

    • memory/4132-135-0x0000000075563000-0x0000000075566000-memory.dmp
      Filesize

      12KB

    • memory/4132-136-0x0000000000E80000-0x0000000000E81000-memory.dmp
      Filesize

      4KB