Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 23:32
Static task
static1
Behavioral task
behavioral1
Sample
ee9a7bc5040182746a74e164b886113a45186fe3a1d73c2b0ed6513a6a4514e6.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
ee9a7bc5040182746a74e164b886113a45186fe3a1d73c2b0ed6513a6a4514e6.dll
-
Size
499KB
-
MD5
e592861b0a5a38ef5385d1d59c59942b
-
SHA1
4b1ec6163e0168b3f5a6eccbce042ca9eccabdbc
-
SHA256
ee9a7bc5040182746a74e164b886113a45186fe3a1d73c2b0ed6513a6a4514e6
-
SHA512
39839e7ba783c29b63ec3247035c3f4bf4e334229d77ac98df355e313610fcdccb43beb037d802d1f4c08f06a81ae7fc5b54817ea44bb94552e0c83b6861d8e2
Malware Config
Extracted
Family
zloader
Botnet
bot5
Campaign
bot5
C2
https://militanttra.at/owg.php
Attributes
-
build_id
11
rc4.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1580 set thread context of 3184 1580 rundll32.exe 89 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3184 msiexec.exe Token: SeSecurityPrivilege 3184 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1580 1568 rundll32.exe 80 PID 1568 wrote to memory of 1580 1568 rundll32.exe 80 PID 1568 wrote to memory of 1580 1568 rundll32.exe 80 PID 1580 wrote to memory of 3184 1580 rundll32.exe 89 PID 1580 wrote to memory of 3184 1580 rundll32.exe 89 PID 1580 wrote to memory of 3184 1580 rundll32.exe 89 PID 1580 wrote to memory of 3184 1580 rundll32.exe 89 PID 1580 wrote to memory of 3184 1580 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee9a7bc5040182746a74e164b886113a45186fe3a1d73c2b0ed6513a6a4514e6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee9a7bc5040182746a74e164b886113a45186fe3a1d73c2b0ed6513a6a4514e6.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-