Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2023 18:57

General

  • Target

    M7R79569.exe

  • Size

    348KB

  • MD5

    8c6810ccbf8b94ad18edabe648ffd504

  • SHA1

    9f3770c114956fb31d04ec3020fe4da03a8ac2d4

  • SHA256

    b8f848f137a23fe046b4701a67d07c8e7e1a8fdb066f318424caede7a1e69530

  • SHA512

    7bf15296bbdce5aee540b9a6738c65a3f54b773f6aa50b27a98ad8c33544ff60625f650c8bb90fa17a0c60e8b799a88536f5609b41a94784fcb283b810f0b7b9

  • SSDEEP

    6144:UMLeUFXXI8t9K/uN6qmhCaHA5DZNyI187cMsU5wgsbZv+:JesY8t9KQ6q9WAZNVOAzzr+

Malware Config

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Spam

C2

https://23d8s23hs89j239sj23.com/jbYm9bt/NlGkb4ivk.php

https://3reh8rd23js9.com/jbYm9bt/NlGkb4ivk.php

https://4f394j89d3j4d89j34d.com/jbYm9bt/NlGkb4ivk.php

https://d823hrd9239sdj2.com/jbYm9bt/NlGkb4ivk.php

https://js823hs23js.com/jbYm9bt/NlGkb4ivk.php

https://oidjweidj34rd3.com/jbYm9bt/NlGkb4ivk.php

https://qwd8s3j8s23h8s.com/jbYm9bt/NlGkb4ivk.php

https://s28hs823hs823js.com/jbYm9bt/NlGkb4ivk.php

https://wd23h8qsh8qhs823qs.com/jbYm9bt/NlGkb4ivk.php

Attributes
  • build_id

    34

rc4.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\M7R79569.exe
    "C:\Users\Admin\AppData\Local\Temp\M7R79569.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3732
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:1312
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 472
      2⤵
      • Program crash
      PID:1020
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3732 -ip 3732
    1⤵
      PID:1652

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1312-139-0x0000000000620000-0x0000000000652000-memory.dmp
      Filesize

      200KB

    • memory/1312-142-0x0000000000620000-0x0000000000652000-memory.dmp
      Filesize

      200KB

    • memory/1312-143-0x0000000000620000-0x0000000000652000-memory.dmp
      Filesize

      200KB

    • memory/3732-134-0x0000000004980000-0x00000000049AE000-memory.dmp
      Filesize

      184KB

    • memory/3732-135-0x0000000000400000-0x0000000002C41000-memory.dmp
      Filesize

      40.3MB

    • memory/3732-140-0x0000000000400000-0x0000000002C41000-memory.dmp
      Filesize

      40.3MB