Analysis
-
max time kernel
165s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 10:07
Static task
static1
Behavioral task
behavioral1
Sample
e6ff434fbb288fb16f228292d41ed7cad38d06eb091ef6b4ab5da61ac96de580.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e6ff434fbb288fb16f228292d41ed7cad38d06eb091ef6b4ab5da61ac96de580.dll
-
Size
274KB
-
MD5
d046de3d748585f4740f11f44c5e7c31
-
SHA1
2b04641bd67e7d4bc6170bbd05b33a33dea521da
-
SHA256
e6ff434fbb288fb16f228292d41ed7cad38d06eb091ef6b4ab5da61ac96de580
-
SHA512
8f5bbdd39a6932b7b30be8736e1d5f7df4d20b894a3396f18daa93b018f7fa0651d3d915d37a13f84359439e23060cd1f9ac12b7c5aeff8f2353b8e0422df6e1
-
SSDEEP
6144:sq0e5NP+8ZqKMLLnMxOl6sl4IgKW1rYxk4xJS4H1m3tz3qLWYemA:s2Cnj6sYS36aC
Malware Config
Extracted
Family
zloader
Botnet
kev
Campaign
02/02
C2
https://inservitudetothedivine.com/post.php
https://pebbleauto.com/post.php
https://ineenbeaudi.tk/post.php
Attributes
-
build_id
325
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 720 set thread context of 5088 720 rundll32.exe 82 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 5088 msiexec.exe Token: SeSecurityPrivilege 5088 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5060 wrote to memory of 720 5060 rundll32.exe 80 PID 5060 wrote to memory of 720 5060 rundll32.exe 80 PID 5060 wrote to memory of 720 5060 rundll32.exe 80 PID 720 wrote to memory of 5088 720 rundll32.exe 82 PID 720 wrote to memory of 5088 720 rundll32.exe 82 PID 720 wrote to memory of 5088 720 rundll32.exe 82 PID 720 wrote to memory of 5088 720 rundll32.exe 82 PID 720 wrote to memory of 5088 720 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e6ff434fbb288fb16f228292d41ed7cad38d06eb091ef6b4ab5da61ac96de580.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e6ff434fbb288fb16f228292d41ed7cad38d06eb091ef6b4ab5da61ac96de580.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-