Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
09-03-2022 13:35
Static task
static1
Behavioral task
behavioral1
Sample
08cb15d9f0002f9c8cddc10e7e6a63fc9e621adc53686c0ed6cf296f60a83f31.dll
Resource
win7-en-20211208
General
-
Target
08cb15d9f0002f9c8cddc10e7e6a63fc9e621adc53686c0ed6cf296f60a83f31.dll
-
Size
438KB
-
MD5
1d09fc6d3308be3bfcc43fe2a8205263
-
SHA1
07e2d91dc8c1f550baf7e613a5a77f6d575b27d1
-
SHA256
08cb15d9f0002f9c8cddc10e7e6a63fc9e621adc53686c0ed6cf296f60a83f31
-
SHA512
e83080ff09630198f32e8b86a9ac391b9637d8e16b535d05c80037497c522f7fffe2c005ecfb713b85c4a6f529533d33424ed75312e05bd1b458975d53df8deb
Malware Config
Extracted
zloader
kev
02/12
https://www.alhasanatbooks.com/reader.php
https://aflim.org.ng/wp-punch.php
https://sardarmohammad.com/reports.php
https://erikarabelo.com.br/server.php
https://thechapelofthehealingcross.org/java.php
https://grebcanualcwilfprofal.ml/wp-smarts.php
-
build_id
261
Signatures
-
Blocklisted process makes network request 18 IoCs
Processes:
msiexec.exeflow pid process 34 544 msiexec.exe 35 544 msiexec.exe 38 544 msiexec.exe 39 544 msiexec.exe 40 544 msiexec.exe 41 544 msiexec.exe 46 544 msiexec.exe 47 544 msiexec.exe 49 544 msiexec.exe 50 544 msiexec.exe 51 544 msiexec.exe 52 544 msiexec.exe 54 544 msiexec.exe 55 544 msiexec.exe 56 544 msiexec.exe 57 544 msiexec.exe 58 544 msiexec.exe 59 544 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 988 set thread context of 544 988 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 544 msiexec.exe Token: SeSecurityPrivilege 544 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3168 wrote to memory of 988 3168 rundll32.exe rundll32.exe PID 3168 wrote to memory of 988 3168 rundll32.exe rundll32.exe PID 3168 wrote to memory of 988 3168 rundll32.exe rundll32.exe PID 988 wrote to memory of 544 988 rundll32.exe msiexec.exe PID 988 wrote to memory of 544 988 rundll32.exe msiexec.exe PID 988 wrote to memory of 544 988 rundll32.exe msiexec.exe PID 988 wrote to memory of 544 988 rundll32.exe msiexec.exe PID 988 wrote to memory of 544 988 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08cb15d9f0002f9c8cddc10e7e6a63fc9e621adc53686c0ed6cf296f60a83f31.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08cb15d9f0002f9c8cddc10e7e6a63fc9e621adc53686c0ed6cf296f60a83f31.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/544-134-0x0000000002DB0000-0x0000000002DD6000-memory.dmpFilesize
152KB
-
memory/544-137-0x0000000002DB0000-0x0000000002DD6000-memory.dmpFilesize
152KB
-
memory/988-130-0x0000000074DC0000-0x0000000074DE6000-memory.dmpFilesize
152KB
-
memory/988-131-0x0000000074DC0000-0x0000000074E39000-memory.dmpFilesize
484KB
-
memory/988-133-0x0000000002BA0000-0x0000000002BA1000-memory.dmpFilesize
4KB
-
memory/988-132-0x0000000074DC0000-0x0000000074E39000-memory.dmpFilesize
484KB