Analysis
-
max time kernel
70s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-04-2022 10:13
Static task
static1
Behavioral task
behavioral1
Sample
6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe
Resource
win7-20220414-en
General
-
Target
6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe
-
Size
282KB
-
MD5
24a14eb9657fff6c151b279556cba1f0
-
SHA1
843624d36b63100beb5bc05e4ddec5659317eb9d
-
SHA256
6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141
-
SHA512
30043da4f8aa33085f2d8238d7151c06f74c8376a3bc2f9deba492e2692d3ed79b7737f416eed11fed9f40d273f84917717b7ecfa745b4fb30274c689664f024
Malware Config
Extracted
zloader
r2
r2
https://notsweets.net/LKhwojehDgwegSDG/gateJKjdsh.php
https://olpons.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://karamelliar.org/LKhwojehDgwegSDG/gateJKjdsh.php
https://dogrunn.com/LKhwojehDgwegSDG/gateJKjdsh.php
https://azoraz.net/LKhwojehDgwegSDG/gateJKjdsh.php
-
build_id
136
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1572 created 2432 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 55 -
suricata: ET MALWARE Zbot POST Request to C2
suricata: ET MALWARE Zbot POST Request to C2
-
Blocklisted process makes network request 5 IoCs
flow pid Process 16 1248 msiexec.exe 18 1248 msiexec.exe 23 1248 msiexec.exe 25 1248 msiexec.exe 27 1248 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1572 set thread context of 1248 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 2068 1572 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe Token: SeSecurityPrivilege 1248 msiexec.exe Token: SeSecurityPrivilege 1248 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1248 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 83 PID 1572 wrote to memory of 1248 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 83 PID 1572 wrote to memory of 1248 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 83 PID 1572 wrote to memory of 1248 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 83 PID 1572 wrote to memory of 1248 1572 6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe 83
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe"C:\Users\Admin\AppData\Local\Temp\6f3d6311fb91f7dea3d8d83833c94ee81b4e936d181619c5c9166f6994532141.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 4483⤵
- Program crash
PID:2068
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1572 -ip 15721⤵PID:312