Analysis
-
max time kernel
203s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
27-03-2022 05:19
Static task
static1
Behavioral task
behavioral1
Sample
3a738adda00a070a9d48413da9a9ae1ef4c83f05be4b3d40edefc632a354d311.dll
Resource
win7-20220310-en
General
-
Target
3a738adda00a070a9d48413da9a9ae1ef4c83f05be4b3d40edefc632a354d311.dll
-
Size
344KB
-
MD5
73c2ec9424087728255ee5d4aa2bed02
-
SHA1
45dd591d72572ded756b5e7cec54489208874ef4
-
SHA256
3a738adda00a070a9d48413da9a9ae1ef4c83f05be4b3d40edefc632a354d311
-
SHA512
c9b6b3e550520ec44a937c0c9728613b3baaea41c7e806c62798b62eeb836b27a02b492bbf9c01798ad7b46429aa817cd25f02a1dc569e47471496cd85e40b40
Malware Config
Extracted
zloader
vek
25/11
https://notaryjean.com/wp-smarts.php
https://www.transcendereconsultancy.com/wp-smarts.php
https://descopera-romania.com/wp-smarts.php
https://hopeandfuture.org/wp-smarts.php
https://saptezile.com/wp-smarts.php
https://tifortgebinvo.tk/wp-smarts.php
-
build_id
250
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2392 set thread context of 3336 2392 regsvr32.exe 83 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3336 msiexec.exe Token: SeSecurityPrivilege 3336 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 448 wrote to memory of 2392 448 regsvr32.exe 78 PID 448 wrote to memory of 2392 448 regsvr32.exe 78 PID 448 wrote to memory of 2392 448 regsvr32.exe 78 PID 2392 wrote to memory of 3336 2392 regsvr32.exe 83 PID 2392 wrote to memory of 3336 2392 regsvr32.exe 83 PID 2392 wrote to memory of 3336 2392 regsvr32.exe 83 PID 2392 wrote to memory of 3336 2392 regsvr32.exe 83 PID 2392 wrote to memory of 3336 2392 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3a738adda00a070a9d48413da9a9ae1ef4c83f05be4b3d40edefc632a354d311.dll1⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3a738adda00a070a9d48413da9a9ae1ef4c83f05be4b3d40edefc632a354d311.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-