Analysis
-
max time kernel
156s -
max time network
180s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 10:18
Static task
static1
Behavioral task
behavioral1
Sample
4180d224eaf6820284b3527f214191b8103d0d4853b45aae37c81b7a0c4e45b3.dll
Resource
win7-en-20211208
General
-
Target
4180d224eaf6820284b3527f214191b8103d0d4853b45aae37c81b7a0c4e45b3.dll
-
Size
438KB
-
MD5
6e6ad2e536f308176dfa419a7a53b14b
-
SHA1
531211dd82b3533d05a654e50683707ad90ba0e0
-
SHA256
4180d224eaf6820284b3527f214191b8103d0d4853b45aae37c81b7a0c4e45b3
-
SHA512
942e58994b01c00993df416fca726e185f1ee0cc96d0f3f6f4de690c13e3ee17ad82e2da5c64d7f0d6c759360e2a2504c2e7c4e177d575b9864ef6cc31724cbe
Malware Config
Extracted
zloader
kev
02/12
https://www.alhasanatbooks.com/reader.php
https://aflim.org.ng/wp-punch.php
https://sardarmohammad.com/reports.php
https://erikarabelo.com.br/server.php
https://thechapelofthehealingcross.org/java.php
https://grebcanualcwilfprofal.ml/wp-smarts.php
-
build_id
261
Signatures
-
Blocklisted process makes network request 24 IoCs
flow pid Process 5 1080 msiexec.exe 6 1080 msiexec.exe 7 1080 msiexec.exe 8 1080 msiexec.exe 9 1080 msiexec.exe 10 1080 msiexec.exe 11 1080 msiexec.exe 12 1080 msiexec.exe 13 1080 msiexec.exe 14 1080 msiexec.exe 15 1080 msiexec.exe 16 1080 msiexec.exe 17 1080 msiexec.exe 18 1080 msiexec.exe 19 1080 msiexec.exe 20 1080 msiexec.exe 21 1080 msiexec.exe 22 1080 msiexec.exe 23 1080 msiexec.exe 24 1080 msiexec.exe 25 1080 msiexec.exe 27 1080 msiexec.exe 28 1080 msiexec.exe 29 1080 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1784 set thread context of 1080 1784 rundll32.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1080 msiexec.exe Token: SeSecurityPrivilege 1080 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1784 1552 rundll32.exe 27 PID 1552 wrote to memory of 1784 1552 rundll32.exe 27 PID 1552 wrote to memory of 1784 1552 rundll32.exe 27 PID 1552 wrote to memory of 1784 1552 rundll32.exe 27 PID 1552 wrote to memory of 1784 1552 rundll32.exe 27 PID 1552 wrote to memory of 1784 1552 rundll32.exe 27 PID 1552 wrote to memory of 1784 1552 rundll32.exe 27 PID 1784 wrote to memory of 1080 1784 rundll32.exe 30 PID 1784 wrote to memory of 1080 1784 rundll32.exe 30 PID 1784 wrote to memory of 1080 1784 rundll32.exe 30 PID 1784 wrote to memory of 1080 1784 rundll32.exe 30 PID 1784 wrote to memory of 1080 1784 rundll32.exe 30 PID 1784 wrote to memory of 1080 1784 rundll32.exe 30 PID 1784 wrote to memory of 1080 1784 rundll32.exe 30 PID 1784 wrote to memory of 1080 1784 rundll32.exe 30 PID 1784 wrote to memory of 1080 1784 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4180d224eaf6820284b3527f214191b8103d0d4853b45aae37c81b7a0c4e45b3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4180d224eaf6820284b3527f214191b8103d0d4853b45aae37c81b7a0c4e45b3.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-