Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 13:01
Behavioral task
behavioral1
Sample
648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296.dll
Resource
win7-20220414-en
General
-
Target
648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296.dll
-
Size
156KB
-
MD5
0e2a67089d12bf0bfb06f54ab52369d6
-
SHA1
57ff02529e54b54bd4e5d51ccb28eae041163ebf
-
SHA256
648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296
-
SHA512
416de0aa9061dbed9e11cdb077f6a81bb45c15ed07e6be1d3df12561e0c47e23daaf4fa1e4d999f22354dac300c3add4300efb2a58b60b935cbab06811b0b357
Malware Config
Extracted
zloader
nut
14/08
https://girldowcahohorme.tk/wp-parsing.php
http://thegamegolfmagazine.com/wp-parsing.php
http://truvaluconsulting.com/wp-parsing.php
https://blog2.textbookrush.com/wp-parsing.php
https://curiosidadez.com.br/wp-parsing.php
https://nonchothetohear.cf/wp-parsing.php
https://sicupira8.com.br/wp-parsing.php
https://titaniumgamers.com/wp-parsing.php
-
build_id
109
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4192 created 1092 4192 regsvr32.exe Explorer.EXE -
suricata: ET MALWARE Zbot POST Request to C2
suricata: ET MALWARE Zbot POST Request to C2
-
Blocklisted process makes network request 13 IoCs
Processes:
msiexec.exeflow pid process 32 2368 msiexec.exe 33 2368 msiexec.exe 34 2368 msiexec.exe 35 2368 msiexec.exe 36 2368 msiexec.exe 37 2368 msiexec.exe 39 2368 msiexec.exe 41 2368 msiexec.exe 42 2368 msiexec.exe 43 2368 msiexec.exe 44 2368 msiexec.exe 45 2368 msiexec.exe 46 2368 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4192 set thread context of 2368 4192 regsvr32.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 4192 regsvr32.exe 4192 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
regsvr32.exemsiexec.exedescription pid process Token: SeDebugPrivilege 4192 regsvr32.exe Token: SeSecurityPrivilege 2368 msiexec.exe Token: SeSecurityPrivilege 2368 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 880 wrote to memory of 4192 880 regsvr32.exe regsvr32.exe PID 880 wrote to memory of 4192 880 regsvr32.exe regsvr32.exe PID 880 wrote to memory of 4192 880 regsvr32.exe regsvr32.exe PID 4192 wrote to memory of 2368 4192 regsvr32.exe msiexec.exe PID 4192 wrote to memory of 2368 4192 regsvr32.exe msiexec.exe PID 4192 wrote to memory of 2368 4192 regsvr32.exe msiexec.exe PID 4192 wrote to memory of 2368 4192 regsvr32.exe msiexec.exe PID 4192 wrote to memory of 2368 4192 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1092
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296.dll2⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\648545a9d8d6a009c81d0fc072e430a91cd2d7cc63c771fb7a88e59de7af5296.dll3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4192
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2368
-