Analysis

  • max time kernel
    81s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-04-2022 15:30

General

  • Target

    a136ba9a5582e0f317934712213eb7bd3758fad92750e02218e29671bda99957.dll

  • Size

    667KB

  • MD5

    be4aefb22447f242df181e65db380687

  • SHA1

    39699d67309a9b8817707a69a915ca0a0a57c607

  • SHA256

    a136ba9a5582e0f317934712213eb7bd3758fad92750e02218e29671bda99957

  • SHA512

    fe1c3667ad73732c27bc48a3a7a64a7ec25e8c0bdc057131e73cacfb01dff5828b507d91b1257f2aa09b6b2cb911ff53b6d5d29e50b32c6ef8c7bfac4eb96029

Malware Config

Extracted

Family

zloader

Botnet

dll26

Campaign

dll26

C2

https://eecakesconf.at/web982/gate.php

Attributes
  • build_id

    7

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a136ba9a5582e0f317934712213eb7bd3758fad92750e02218e29671bda99957.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3984
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a136ba9a5582e0f317934712213eb7bd3758fad92750e02218e29671bda99957.dll,#1
      2⤵
        PID:820
        • C:\Windows\SysWOW64\msiexec.exe
          msiexec.exe
          3⤵
            PID:260

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/260-134-0x0000000000000000-mapping.dmp
      • memory/260-135-0x0000000000900000-0x0000000000926000-memory.dmp
        Filesize

        152KB

      • memory/260-136-0x0000000000900000-0x0000000000926000-memory.dmp
        Filesize

        152KB

      • memory/820-130-0x0000000000000000-mapping.dmp
      • memory/820-131-0x0000000074FC0000-0x0000000074FE6000-memory.dmp
        Filesize

        152KB

      • memory/820-132-0x0000000074FC0000-0x0000000075073000-memory.dmp
        Filesize

        716KB

      • memory/820-133-0x0000000074FC0000-0x0000000075073000-memory.dmp
        Filesize

        716KB