Analysis

  • max time kernel
    120s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2022 19:28

General

  • Target

    invest_20.dll

  • Size

    453KB

  • MD5

    c9affd7934e4d9b4dec4c40b2a71a381

  • SHA1

    aac940f9906034938cd657ed2ba21bc675e6ae20

  • SHA256

    31cf42b2a7c5c558f44cfc67684cc344c17d4946d3a1e0b2cecb8eb58173cb2f

  • SHA512

    82d18e7815ed38c07ca0b6ec82cb2e30451d0e02a9cd761e1d55d6f05955fac3df303d96bac89dea6dfa3b90def945ca413ae9854dd7b24fbcc18e6c6040f18a

  • SSDEEP

    6144:JWm73CWN0OejuX3VR4YCrqGro3O32YHFhIaA1fjYDr1qhHkmviFJf0:JKGK6Vtiq0UOdFhqLYwP2Jf0

Malware Config

Extracted

Family

zloader

Botnet

goldhub

Campaign

01.04.20

C2

https://105711.com/docs.php

https://209711.com/process.php

https://106311.com/comegetsome.php

https://124331.com/success.php

Attributes
  • build_id

    42

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\invest_20.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\invest_20.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:1392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1392-137-0x0000000001220000-0x0000000001250000-memory.dmp

    Filesize

    192KB

  • memory/1392-139-0x0000000001220000-0x0000000001250000-memory.dmp

    Filesize

    192KB

  • memory/1392-140-0x0000000001220000-0x0000000001250000-memory.dmp

    Filesize

    192KB

  • memory/2220-133-0x0000000074DB0000-0x0000000074DE0000-memory.dmp

    Filesize

    192KB

  • memory/2220-134-0x0000000074DB0000-0x0000000074E3C000-memory.dmp

    Filesize

    560KB

  • memory/2220-135-0x0000000074DB0000-0x0000000074E3C000-memory.dmp

    Filesize

    560KB

  • memory/2220-138-0x0000000074DB0000-0x0000000074E3C000-memory.dmp

    Filesize

    560KB