Analysis
-
max time kernel
134s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-05-2022 02:11
Static task
static1
Behavioral task
behavioral1
Sample
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe
-
Size
364KB
-
MD5
237dcba926f68d809230a71529172e4c
-
SHA1
350ef285178655aa95e49b51957ec14d9e36ba78
-
SHA256
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949
-
SHA512
8dd34cf5c04c8d2de31338da1abed2dbb0474f99198330fbe69a5a0f37a3027ccf70ea4d9647447477d1a1d446dfc621ab834b95117b8bcd67ed1cf18f047b30
Malware Config
Extracted
Family
zloader
Botnet
Raz
Campaign
Raz
C2
http://softwareserviceupdater5.com/web/post.php
Attributes
-
build_id
35
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exedescription pid process target process PID 1956 created 1204 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe Explorer.EXE -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exef32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exedescription pid process target process PID 948 set thread context of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 1956 set thread context of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exef32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exepid process 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exef32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exedescription pid process Token: SeDebugPrivilege 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe Token: SeDebugPrivilege 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exef32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exedescription pid process target process PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 948 wrote to memory of 1956 948 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe PID 1956 wrote to memory of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe PID 1956 wrote to memory of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe PID 1956 wrote to memory of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe PID 1956 wrote to memory of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe PID 1956 wrote to memory of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe PID 1956 wrote to memory of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe PID 1956 wrote to memory of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe PID 1956 wrote to memory of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe PID 1956 wrote to memory of 600 1956 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe"C:\Users\Admin\AppData\Local\Temp\f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe"C:\Users\Admin\AppData\Local\Temp\f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵PID:600
-