Resubmissions

24-05-2023 17:16

230524-vs7cysea9x 10

09-11-2020 20:02

201109-kefnpvgfd6 10

Analysis

  • max time kernel
    1716s
  • max time network
    1719s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-05-2023 17:16

General

  • Target

    readme.exe

  • Size

    348KB

  • MD5

    8c6810ccbf8b94ad18edabe648ffd504

  • SHA1

    9f3770c114956fb31d04ec3020fe4da03a8ac2d4

  • SHA256

    b8f848f137a23fe046b4701a67d07c8e7e1a8fdb066f318424caede7a1e69530

  • SHA512

    7bf15296bbdce5aee540b9a6738c65a3f54b773f6aa50b27a98ad8c33544ff60625f650c8bb90fa17a0c60e8b799a88536f5609b41a94784fcb283b810f0b7b9

  • SSDEEP

    6144:UMLeUFXXI8t9K/uN6qmhCaHA5DZNyI187cMsU5wgsbZv+:JesY8t9KQ6q9WAZNVOAzzr+

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Spam

C2

https://23d8s23hs89j239sj23.com/jbYm9bt/NlGkb4ivk.php

https://3reh8rd23js9.com/jbYm9bt/NlGkb4ivk.php

https://4f394j89d3j4d89j34d.com/jbYm9bt/NlGkb4ivk.php

https://d823hrd9239sdj2.com/jbYm9bt/NlGkb4ivk.php

https://js823hs23js.com/jbYm9bt/NlGkb4ivk.php

https://oidjweidj34rd3.com/jbYm9bt/NlGkb4ivk.php

https://qwd8s3j8s23h8s.com/jbYm9bt/NlGkb4ivk.php

https://s28hs823hs823js.com/jbYm9bt/NlGkb4ivk.php

https://wd23h8qsh8qhs823qs.com/jbYm9bt/NlGkb4ivk.php

Attributes
  • build_id

    34

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\readme.exe
    "C:\Users\Admin\AppData\Local\Temp\readme.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:1780

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1308-122-0x00000000049A0000-0x00000000049CE000-memory.dmp
    Filesize

    184KB

  • memory/1308-123-0x0000000000400000-0x0000000002C41000-memory.dmp
    Filesize

    40.3MB

  • memory/1308-124-0x00000000049A0000-0x00000000049CE000-memory.dmp
    Filesize

    184KB

  • memory/1308-130-0x0000000000400000-0x0000000002C41000-memory.dmp
    Filesize

    40.3MB

  • memory/1780-129-0x00000000001A0000-0x00000000001D2000-memory.dmp
    Filesize

    200KB

  • memory/1780-135-0x00000000001A0000-0x00000000001D2000-memory.dmp
    Filesize

    200KB

  • memory/1780-134-0x00000000001A0000-0x00000000001D2000-memory.dmp
    Filesize

    200KB