Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-05-2022 02:11
Static task
static1
Behavioral task
behavioral1
Sample
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe
-
Size
364KB
-
MD5
237dcba926f68d809230a71529172e4c
-
SHA1
350ef285178655aa95e49b51957ec14d9e36ba78
-
SHA256
f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949
-
SHA512
8dd34cf5c04c8d2de31338da1abed2dbb0474f99198330fbe69a5a0f37a3027ccf70ea4d9647447477d1a1d446dfc621ab834b95117b8bcd67ed1cf18f047b30
Malware Config
Extracted
Family
zloader
Botnet
Raz
Campaign
Raz
C2
http://softwareserviceupdater5.com/web/post.php
Attributes
-
build_id
35
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1488 created 2948 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 42 -
suricata: ET MALWARE Zbot POST Request to C2
suricata: ET MALWARE Zbot POST Request to C2
-
Blocklisted process makes network request 1 IoCs
flow pid Process 69 3108 msiexec.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4844 set thread context of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 1488 set thread context of 3108 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 95 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe Token: SeDebugPrivilege 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe Token: SeSecurityPrivilege 3108 msiexec.exe Token: SeSecurityPrivilege 3108 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4844 wrote to memory of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 4844 wrote to memory of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 4844 wrote to memory of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 4844 wrote to memory of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 4844 wrote to memory of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 4844 wrote to memory of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 4844 wrote to memory of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 4844 wrote to memory of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 4844 wrote to memory of 1488 4844 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 90 PID 1488 wrote to memory of 3108 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 95 PID 1488 wrote to memory of 3108 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 95 PID 1488 wrote to memory of 3108 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 95 PID 1488 wrote to memory of 3108 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 95 PID 1488 wrote to memory of 3108 1488 f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe"C:\Users\Admin\AppData\Local\Temp\f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe"C:\Users\Admin\AppData\Local\Temp\f32f0d0bb54491c4c51a1ac17e62ede428373bb0130acaf6ac544c5b7b83e949.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3108
-