Analysis
-
max time kernel
184s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 03:52
Static task
static1
Behavioral task
behavioral1
Sample
6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f.dll
Resource
win7-20220414-en
General
-
Target
6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f.dll
-
Size
446KB
-
MD5
a65312552f22156249bac2ddfc8a9811
-
SHA1
216505bd8e3448436f6fa202e64c0046c3ee4f60
-
SHA256
6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f
-
SHA512
12a69f8e3940724ad203352293c6e8e257305fa6dfa04e961d292be3734233c9c934dc7f0781a93b7c4847709e26cb199c2f24673d22dafdf22ce9cf2986fb4b
Malware Config
Extracted
zloader
apr17
spam
http://wmwifbajxxbcxmucxmlc.com/post.php
http://ojnxjgfjlftfkkuxxiqd.com/post.php
http://pwkqhdgytsshkoibaake.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fyratyubvflktyyjiqgq.com/post.php
-
build_id
108
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exeflow pid process 5 1172 msiexec.exe 7 1172 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 996 set thread context of 1172 996 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 1172 msiexec.exe Token: SeSecurityPrivilege 1172 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 296 wrote to memory of 996 296 rundll32.exe rundll32.exe PID 296 wrote to memory of 996 296 rundll32.exe rundll32.exe PID 296 wrote to memory of 996 296 rundll32.exe rundll32.exe PID 296 wrote to memory of 996 296 rundll32.exe rundll32.exe PID 296 wrote to memory of 996 296 rundll32.exe rundll32.exe PID 296 wrote to memory of 996 296 rundll32.exe rundll32.exe PID 296 wrote to memory of 996 296 rundll32.exe rundll32.exe PID 996 wrote to memory of 1172 996 rundll32.exe msiexec.exe PID 996 wrote to memory of 1172 996 rundll32.exe msiexec.exe PID 996 wrote to memory of 1172 996 rundll32.exe msiexec.exe PID 996 wrote to memory of 1172 996 rundll32.exe msiexec.exe PID 996 wrote to memory of 1172 996 rundll32.exe msiexec.exe PID 996 wrote to memory of 1172 996 rundll32.exe msiexec.exe PID 996 wrote to memory of 1172 996 rundll32.exe msiexec.exe PID 996 wrote to memory of 1172 996 rundll32.exe msiexec.exe PID 996 wrote to memory of 1172 996 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-