Analysis
-
max time kernel
17s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 05:10
Static task
static1
Behavioral task
behavioral1
Sample
913c6f65e3cab1756f424fa7c2d81b75ab0726b66d5c301056740821b641adfb.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
913c6f65e3cab1756f424fa7c2d81b75ab0726b66d5c301056740821b641adfb.dll
Resource
win10v2004-20220414-en
General
-
Target
913c6f65e3cab1756f424fa7c2d81b75ab0726b66d5c301056740821b641adfb.dll
-
Size
582KB
-
MD5
c822149db6e41ee020572700b82eff28
-
SHA1
5c8b4eaac5e209c11fd8ccd6a86b5629d8a04741
-
SHA256
913c6f65e3cab1756f424fa7c2d81b75ab0726b66d5c301056740821b641adfb
-
SHA512
eac49b60df3ca9b34d8f5f5117a0c89eac466fd9a6209fab9cd91d34978a687fbae83c72311af2d793d211de81246dd3b515ac78d5213a7aca2064ff15a591ed
Malware Config
Extracted
zloader
googleaktualizacija
googleaktualizacija
https://iqowijsdakm.ru/gate.php
https://wiewjdmkfjn.ru/gate.php
https://dksaoidiakjd.su/gate.php
https://iweuiqjdakjd.su/gate.php
https://yuidskadjna.su/gate.php
https://olksmadnbdj.su/gate.php
https://odsakmdfnbs.su/gate.php
https://odsakjmdnhsaj.su/gate.php
https://odjdnhsaj.su/gate.php
https://odoishsaj.su/gate.php
-
build_id
148
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1648 wrote to memory of 888 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 888 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 888 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 888 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 888 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 888 1648 rundll32.exe rundll32.exe PID 1648 wrote to memory of 888 1648 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\913c6f65e3cab1756f424fa7c2d81b75ab0726b66d5c301056740821b641adfb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\913c6f65e3cab1756f424fa7c2d81b75ab0726b66d5c301056740821b641adfb.dll,#12⤵PID:888
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:948
-
-