Analysis
-
max time kernel
157s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 15:56
Static task
static1
Behavioral task
behavioral1
Sample
164d36f53bcb5f7a12e35853f30792a8c106488c71b5a2145486b998cfaf804a.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
164d36f53bcb5f7a12e35853f30792a8c106488c71b5a2145486b998cfaf804a.dll
-
Size
415KB
-
MD5
dbadd7d0d59eeb30ce5a7eda3f4a3336
-
SHA1
1e8d76eef202ef2aa6669f8a8e2b1a61b941671e
-
SHA256
164d36f53bcb5f7a12e35853f30792a8c106488c71b5a2145486b998cfaf804a
-
SHA512
5cbd1b97ed9a6a6432c5c950b49c9b2abc49f13ee5e53b2c202842084ce46630458692bca5fe4c2208d24fd9ed23be422e365b50ed6fd372a77924283e41a183
Malware Config
Extracted
Family
zloader
Botnet
october
Campaign
october08
C2
http://sept9stuff10.com/web/post.php
http://sept9stuff11.com/web/post.php
Attributes
-
build_id
55
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1620 1928 regsvr32.exe 27 PID 1928 wrote to memory of 1620 1928 regsvr32.exe 27 PID 1928 wrote to memory of 1620 1928 regsvr32.exe 27 PID 1928 wrote to memory of 1620 1928 regsvr32.exe 27 PID 1928 wrote to memory of 1620 1928 regsvr32.exe 27 PID 1928 wrote to memory of 1620 1928 regsvr32.exe 27 PID 1928 wrote to memory of 1620 1928 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\164d36f53bcb5f7a12e35853f30792a8c106488c71b5a2145486b998cfaf804a.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\164d36f53bcb5f7a12e35853f30792a8c106488c71b5a2145486b998cfaf804a.dll2⤵PID:1620
-