Analysis
-
max time kernel
77s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
09-02-2023 02:18
Static task
static1
Behavioral task
behavioral1
Sample
c75f4e1fd464e21826c37e5abf7fed93b48c721625f700f49aa71cbce377ee8a-1.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c75f4e1fd464e21826c37e5abf7fed93b48c721625f700f49aa71cbce377ee8a-1.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
entomology.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
entomology.dll
Resource
win10v2004-20221111-en
General
-
Target
entomology.dll
-
Size
225KB
-
MD5
96874e8ec64976899a1f7b90022f3e43
-
SHA1
ab33331de0ab0f9dddb2b8eb8e4e8c92b18a9c61
-
SHA256
badc87166cc28491dcae0164e7dc027aeb4b98eea5f765f776f58d8683cdec6a
-
SHA512
4e8bccc9fe9d507817f78950388a8726f95a5aafd9a9e192ef9e33871a67cb9d44ff56c4a0c03490c30e2d272ca08ba3819992bc21d810bc3885ac7f4cf5b63b
-
SSDEEP
3072:XPbq/XSqcbXdOg9gkx/yrNPwwApe6eIDK+C9iKy6K7kDlUzYak6ve432+fGxsN5w:jqKDXdOAgUKXvji7oDvaNm4mSGqe9d
Malware Config
Extracted
zloader
main
2020-06-12
https://matarlod.org/web/data
https://datearoc.org/web/data
https://rechnecy.org/web/data
https://ramissal.org/web/data
https://raidesci.org/web/data
https://glartrot.org/web/data
https://revenapo.org/web/data
https://brenonip.org/web/data
-
build_id
6
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2016 set thread context of 1760 2016 rundll32.exe 28 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1760 msiexec.exe Token: SeSecurityPrivilege 1760 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2016 1928 rundll32.exe 27 PID 1928 wrote to memory of 2016 1928 rundll32.exe 27 PID 1928 wrote to memory of 2016 1928 rundll32.exe 27 PID 1928 wrote to memory of 2016 1928 rundll32.exe 27 PID 1928 wrote to memory of 2016 1928 rundll32.exe 27 PID 1928 wrote to memory of 2016 1928 rundll32.exe 27 PID 1928 wrote to memory of 2016 1928 rundll32.exe 27 PID 2016 wrote to memory of 1760 2016 rundll32.exe 28 PID 2016 wrote to memory of 1760 2016 rundll32.exe 28 PID 2016 wrote to memory of 1760 2016 rundll32.exe 28 PID 2016 wrote to memory of 1760 2016 rundll32.exe 28 PID 2016 wrote to memory of 1760 2016 rundll32.exe 28 PID 2016 wrote to memory of 1760 2016 rundll32.exe 28 PID 2016 wrote to memory of 1760 2016 rundll32.exe 28 PID 2016 wrote to memory of 1760 2016 rundll32.exe 28 PID 2016 wrote to memory of 1760 2016 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\entomology.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\entomology.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-