Analysis
-
max time kernel
165s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 14:19
Static task
static1
Behavioral task
behavioral1
Sample
830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46.dll
Resource
win7-20221111-en
General
-
Target
830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46.dll
-
Size
493KB
-
MD5
efddc2807ecbdffd694cd97936404053
-
SHA1
c68b7b94e591fbc4cda9bdb8c2caaa33880464c7
-
SHA256
830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46
-
SHA512
e6b0fd0f52c5b7e82bb66d08c4a3f8a4bddf1ce75c140e73afb4c1f57131df81e5d39f7833de15b40e980f0605bfd1840f81b610134634db000f6e18388bf09a
-
SSDEEP
12288:WsCr6MfAEtHaqxnXmtkl0CMh+1wY7JuegO4I9y:Wsi6MBtHBzlRMg1wY34I9y
Malware Config
Extracted
zloader
nut
18/02
https://ramkanshop.ir/post.php
https://lph786.com/post.php
https://efaschoolfarooka.com/post.php
https://forexstick.com/post.php
https://firteccom.com/post.php
https://www.psychologynewmind.com/post.php
https://dirashightapbide.tk/post.php
-
build_id
358
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 32 4896 msiexec.exe 33 4896 msiexec.exe 35 4896 msiexec.exe 39 4896 msiexec.exe 40 4896 msiexec.exe 42 4896 msiexec.exe 54 4896 msiexec.exe 56 4896 msiexec.exe 61 4896 msiexec.exe 62 4896 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1132 set thread context of 4896 1132 rundll32.exe 83 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 4896 msiexec.exe Token: SeSecurityPrivilege 4896 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1132 2280 rundll32.exe 81 PID 2280 wrote to memory of 1132 2280 rundll32.exe 81 PID 2280 wrote to memory of 1132 2280 rundll32.exe 81 PID 1132 wrote to memory of 4896 1132 rundll32.exe 83 PID 1132 wrote to memory of 4896 1132 rundll32.exe 83 PID 1132 wrote to memory of 4896 1132 rundll32.exe 83 PID 1132 wrote to memory of 4896 1132 rundll32.exe 83 PID 1132 wrote to memory of 4896 1132 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-