Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 03:52
Static task
static1
Behavioral task
behavioral1
Sample
6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f.dll
Resource
win7-20220414-en
General
-
Target
6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f.dll
-
Size
446KB
-
MD5
a65312552f22156249bac2ddfc8a9811
-
SHA1
216505bd8e3448436f6fa202e64c0046c3ee4f60
-
SHA256
6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f
-
SHA512
12a69f8e3940724ad203352293c6e8e257305fa6dfa04e961d292be3734233c9c934dc7f0781a93b7c4847709e26cb199c2f24673d22dafdf22ce9cf2986fb4b
Malware Config
Extracted
zloader
apr17
spam
http://wmwifbajxxbcxmucxmlc.com/post.php
http://ojnxjgfjlftfkkuxxiqd.com/post.php
http://pwkqhdgytsshkoibaake.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fyratyubvflktyyjiqgq.com/post.php
-
build_id
108
Signatures
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
suricata: ET MALWARE Zbot POST Request to C2
suricata: ET MALWARE Zbot POST Request to C2
-
Blocklisted process makes network request 11 IoCs
flow pid Process 45 728 msiexec.exe 47 728 msiexec.exe 49 728 msiexec.exe 51 728 msiexec.exe 53 728 msiexec.exe 55 728 msiexec.exe 57 728 msiexec.exe 59 728 msiexec.exe 61 728 msiexec.exe 63 728 msiexec.exe 66 728 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 876 set thread context of 728 876 rundll32.exe 89 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 728 msiexec.exe Token: SeSecurityPrivilege 728 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3928 wrote to memory of 876 3928 rundll32.exe 81 PID 3928 wrote to memory of 876 3928 rundll32.exe 81 PID 3928 wrote to memory of 876 3928 rundll32.exe 81 PID 876 wrote to memory of 728 876 rundll32.exe 89 PID 876 wrote to memory of 728 876 rundll32.exe 89 PID 876 wrote to memory of 728 876 rundll32.exe 89 PID 876 wrote to memory of 728 876 rundll32.exe 89 PID 876 wrote to memory of 728 876 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ffa4cfa0466047e7a320dd9aa57417d14dd9a185306fdecc9a79352d88a682f.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-