Resubmissions

09-02-2023 02:28

230209-cyewsaga48 10

09-02-2023 02:18

230209-crm9ksff67 10

Analysis

  • max time kernel
    77s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    09-02-2023 02:18

General

  • Target

    entomology.dll

  • Size

    225KB

  • MD5

    96874e8ec64976899a1f7b90022f3e43

  • SHA1

    ab33331de0ab0f9dddb2b8eb8e4e8c92b18a9c61

  • SHA256

    badc87166cc28491dcae0164e7dc027aeb4b98eea5f765f776f58d8683cdec6a

  • SHA512

    4e8bccc9fe9d507817f78950388a8726f95a5aafd9a9e192ef9e33871a67cb9d44ff56c4a0c03490c30e2d272ca08ba3819992bc21d810bc3885ac7f4cf5b63b

  • SSDEEP

    3072:XPbq/XSqcbXdOg9gkx/yrNPwwApe6eIDK+C9iKy6K7kDlUzYak6ve432+fGxsN5w:jqKDXdOAgUKXvji7oDvaNm4mSGqe9d

Malware Config

Extracted

Family

zloader

Botnet

main

Campaign

2020-06-12

C2

https://matarlod.org/web/data

https://datearoc.org/web/data

https://rechnecy.org/web/data

https://ramissal.org/web/data

https://raidesci.org/web/data

https://glartrot.org/web/data

https://revenapo.org/web/data

https://brenonip.org/web/data

Attributes
  • build_id

    6

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\entomology.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\entomology.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1760-58-0x0000000000090000-0x00000000000BC000-memory.dmp

    Filesize

    176KB

  • memory/1760-60-0x0000000000090000-0x00000000000BC000-memory.dmp

    Filesize

    176KB

  • memory/1760-64-0x0000000000090000-0x00000000000BC000-memory.dmp

    Filesize

    176KB

  • memory/1760-65-0x0000000000090000-0x00000000000BC000-memory.dmp

    Filesize

    176KB

  • memory/2016-55-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/2016-56-0x0000000000180000-0x00000000001AA000-memory.dmp

    Filesize

    168KB

  • memory/2016-57-0x0000000000220000-0x000000000024C000-memory.dmp

    Filesize

    176KB

  • memory/2016-62-0x0000000000220000-0x000000000024C000-memory.dmp

    Filesize

    176KB