Analysis
-
max time kernel
85s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 02:33
Static task
static1
Behavioral task
behavioral1
Sample
fe92ba37ac1124c880983da60dd4b32bc8d82a180c5784bb72f9a0df41950a17.dll
Resource
win7-20220414-en
General
-
Target
fe92ba37ac1124c880983da60dd4b32bc8d82a180c5784bb72f9a0df41950a17.dll
-
Size
652KB
-
MD5
3164bff4a716e80bd44e623135f93f82
-
SHA1
f1b87e225d149464eee3781808dd9ccf293d221b
-
SHA256
fe92ba37ac1124c880983da60dd4b32bc8d82a180c5784bb72f9a0df41950a17
-
SHA512
0165f96a030e97160a65a4e75a2663ae0447a0d3990a007a2bc27c510bb836eba127224219dbaa91d728c77e0686d064ea10fb871f74325158d8fb0d88c68da9
Malware Config
Extracted
zloader
oct
oct23
http://wingtonwelbemdon.com/web/post.php
http://donburitimesofindia.com/web/post.php
http://celtictimesofkarishan.com/web/post.php
http://welcometothehotelsoflifes.com/web/post.php
http://wheredidtheelllcctoncsgo.com/web/post.php
http://myworld2002020999.com/web/post.php
-
build_id
68
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4004 wrote to memory of 2996 4004 rundll32.exe rundll32.exe PID 4004 wrote to memory of 2996 4004 rundll32.exe rundll32.exe PID 4004 wrote to memory of 2996 4004 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe92ba37ac1124c880983da60dd4b32bc8d82a180c5784bb72f9a0df41950a17.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe92ba37ac1124c880983da60dd4b32bc8d82a180c5784bb72f9a0df41950a17.dll,#12⤵PID:2996
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe1⤵PID:4800