Analysis
-
max time kernel
46s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 17:41
Static task
static1
Behavioral task
behavioral1
Sample
84e0da69f087625607c97c889e3e640d49e2718c568ad4d463100de44721df20.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
84e0da69f087625607c97c889e3e640d49e2718c568ad4d463100de44721df20.dll
Resource
win10v2004-20220812-en
General
-
Target
84e0da69f087625607c97c889e3e640d49e2718c568ad4d463100de44721df20.dll
-
Size
596KB
-
MD5
1848710f7840771b98a7479c4ee1a921
-
SHA1
508964276e7da323de16f6d3f25534c92fc4576d
-
SHA256
84e0da69f087625607c97c889e3e640d49e2718c568ad4d463100de44721df20
-
SHA512
78a2ce199be94b637ba3f42b6f0da399dfea93e12dc744c0cebdaae1ba8c81a1a3021ca3e5182605fa670f0e5d047f7a31cc62b1f27976aec4144bbb8434facb
-
SSDEEP
12288:8L3o6XSk12WACq+6eYuHyAUStUeinhn6:M3o6J12jC5JLHDUAUY
Malware Config
Extracted
zloader
googleaktualizacija
googleaktualizacija2
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
-
build_id
156
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 976 wrote to memory of 1472 976 regsvr32.exe 83 PID 976 wrote to memory of 1472 976 regsvr32.exe 83 PID 976 wrote to memory of 1472 976 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\84e0da69f087625607c97c889e3e640d49e2718c568ad4d463100de44721df20.dll1⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\84e0da69f087625607c97c889e3e640d49e2718c568ad4d463100de44721df20.dll2⤵PID:1472
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:4116
-
-