45f3f5d22895889574eb220c91242129153c6d85374d08665348c3bbe3414543.dll
485KB
20-05-2022 23:56
behavioral1
e4a088773d56d0f6e7d1582f100b5137
5cf878a09b2de0b664467b928ad03453e5c1491e
45f3f5d22895889574eb220c91242129153c6d85374d08665348c3bbe3414543
eea5d926f100f5ae136e2ea5c71530ff087349ed89aa069b1cc4490ca8bb0432e1013e953de6c56befd660acd673d388aeef3e9db0ced7cbd4dd71ed432f0f6d
Extracted
Family | zloader |
Botnet | r1 |
Campaign | r1 |
C2 |
http://bsraotpeiimmrnchcqvr.com/LKhwojehDgwegSDG/gateJKjdsh.php http://exqnbgauiphxqdeecitw.com/LKhwojehDgwegSDG/gateJKjdsh.php http://fpbkvirfkfvufpbkvgty.com/LKhwojehDgwegSDG/gateJKjdsh.php http://hikowojacckxccgglhvy.com/LKhwojehDgwegSDG/gateJKjdsh.php http://kdrowkrjhrdmbxkthljt.com/LKhwojehDgwegSDG/gateJKjdsh.php http://nvlmtlisfmcfgimicstx.com/LKhwojehDgwegSDG/gateJKjdsh.php http://syohvyctqfcgakxepsou.com/LKhwojehDgwegSDG/gateJKjdsh.php http://wdwrhikolxfwyyhwwfut.com/LKhwojehDgwegSDG/gateJKjdsh.php |
Attributes |
build_id 17 |
rc4.plain |
|
rsa_pubkey.plain |
|
Filter: none
-
Suspicious use of NtCreateUserProcessOtherParentProcessregsvr32.exe
Reported IOCs
description pid process target process PID 1676 created 1296 1676 regsvr32.exe Explorer.EXE -
Zloader, Terdot, DELoader, ZeusSphinx
Description
Zloader is a malware strain that was initially discovered back in August 2015.
Tags
-
Suspicious use of SetThreadContextregsvr32.exe
Reported IOCs
description pid process target process PID 1676 set thread context of 916 1676 regsvr32.exe msiexec.exe -
Suspicious behavior: EnumeratesProcessesregsvr32.exe
Reported IOCs
pid process 1676 regsvr32.exe -
Suspicious use of AdjustPrivilegeTokenregsvr32.exemsiexec.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 1676 regsvr32.exe Token: SeSecurityPrivilege 916 msiexec.exe Token: SeSecurityPrivilege 916 msiexec.exe -
Suspicious use of WriteProcessMemoryregsvr32.exeregsvr32.exe
Reported IOCs
description pid process target process PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1676 wrote to memory of 916 1676 regsvr32.exe msiexec.exe PID 1676 wrote to memory of 916 1676 regsvr32.exe msiexec.exe PID 1676 wrote to memory of 916 1676 regsvr32.exe msiexec.exe PID 1676 wrote to memory of 916 1676 regsvr32.exe msiexec.exe PID 1676 wrote to memory of 916 1676 regsvr32.exe msiexec.exe PID 1676 wrote to memory of 916 1676 regsvr32.exe msiexec.exe PID 1676 wrote to memory of 916 1676 regsvr32.exe msiexec.exe PID 1676 wrote to memory of 916 1676 regsvr32.exe msiexec.exe PID 1676 wrote to memory of 916 1676 regsvr32.exe msiexec.exe
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\45f3f5d22895889574eb220c91242129153c6d85374d08665348c3bbe3414543.dllSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\45f3f5d22895889574eb220c91242129153c6d85374d08665348c3bbe3414543.dllSuspicious use of NtCreateUserProcessOtherParentProcessSuspicious use of SetThreadContextSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exeSuspicious use of AdjustPrivilegeToken
-
memory/916-60-0x00000000000D0000-0x00000000000FD000-memory.dmp
-
memory/916-62-0x00000000000D0000-0x00000000000FD000-memory.dmp
-
memory/916-63-0x0000000000000000-mapping.dmp
-
memory/916-65-0x00000000000D0000-0x00000000000FD000-memory.dmp
-
memory/1304-54-0x000007FEFBDC1000-0x000007FEFBDC3000-memory.dmp
-
memory/1676-58-0x0000000074970000-0x00000000749FB000-memory.dmp
-
memory/1676-59-0x0000000074970000-0x00000000749FB000-memory.dmp
-
memory/1676-55-0x0000000000000000-mapping.dmp
-
memory/1676-56-0x0000000076451000-0x0000000076453000-memory.dmp
-
memory/1676-57-0x0000000074970000-0x000000007499D000-memory.dmp