Analysis

  • max time kernel
    101s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2022 19:28

General

  • Target

    invest_20.dll

  • Size

    453KB

  • MD5

    c9affd7934e4d9b4dec4c40b2a71a381

  • SHA1

    aac940f9906034938cd657ed2ba21bc675e6ae20

  • SHA256

    31cf42b2a7c5c558f44cfc67684cc344c17d4946d3a1e0b2cecb8eb58173cb2f

  • SHA512

    82d18e7815ed38c07ca0b6ec82cb2e30451d0e02a9cd761e1d55d6f05955fac3df303d96bac89dea6dfa3b90def945ca413ae9854dd7b24fbcc18e6c6040f18a

  • SSDEEP

    6144:JWm73CWN0OejuX3VR4YCrqGro3O32YHFhIaA1fjYDr1qhHkmviFJf0:JKGK6Vtiq0UOdFhqLYwP2Jf0

Malware Config

Extracted

Family

zloader

Botnet

goldhub

Campaign

01.04.20

C2

https://105711.com/docs.php

https://209711.com/process.php

https://106311.com/comegetsome.php

https://124331.com/success.php

Attributes
  • build_id

    42

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\invest_20.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\invest_20.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1080-55-0x0000000075A71000-0x0000000075A73000-memory.dmp

    Filesize

    8KB

  • memory/1080-57-0x00000000751D0000-0x000000007525C000-memory.dmp

    Filesize

    560KB

  • memory/1080-56-0x00000000751D0000-0x0000000075200000-memory.dmp

    Filesize

    192KB

  • memory/1080-58-0x00000000751D0000-0x000000007525C000-memory.dmp

    Filesize

    560KB

  • memory/1080-63-0x00000000751D0000-0x000000007525C000-memory.dmp

    Filesize

    560KB

  • memory/1880-59-0x00000000000F0000-0x0000000000120000-memory.dmp

    Filesize

    192KB

  • memory/1880-61-0x00000000000F0000-0x0000000000120000-memory.dmp

    Filesize

    192KB

  • memory/1880-65-0x00000000000F0000-0x0000000000120000-memory.dmp

    Filesize

    192KB

  • memory/1880-66-0x00000000000F0000-0x0000000000120000-memory.dmp

    Filesize

    192KB