Resubmissions
10-08-2023 17:09
230810-vn35qsfe85 1010-08-2023 16:29
230810-ty96csgg4t 1007-07-2021 20:32
210707-5mqmkk4eyx 10Analysis
-
max time kernel
1792s -
max time network
1800s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
10-08-2023 16:29
General
-
Target
1f41fd3e96ef1c1328d08ced03ac5e1b717a45cda8cf94a1c4ffe775e43623b8.dll
-
Size
172KB
-
MD5
2297dee946320ce03b8db35b1ae6462d
-
SHA1
5958e724e5cceca807531b2b1ea4b18a2a8698dd
-
SHA256
1f41fd3e96ef1c1328d08ced03ac5e1b717a45cda8cf94a1c4ffe775e43623b8
-
SHA512
560b1f80b5e96ae8281bbea2271476a2a38d6c55b231c4e5594d9581cf5cb0bdcfffb1cd02b4aca4249eb0e21b15ee48391c02d7170dfad410ae591243ff5188
-
SSDEEP
3072:EoUF1YzA5/iJ+PG6qOP3SCmNTxJ43nPNntucoYBqCWCpJw6vS5dTGzpsf4eP4:OQJ2P3nmpxAzoSqBC162feg
Malware Config
Extracted
Family
zloader
Botnet
mk1
Campaign
mac2
C2
https://dssdffsdf.drld/mm.php
Attributes
-
build_id
43
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2128 created 1268 2128 regsvr32.exe 15 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2128 set thread context of 2292 2128 regsvr32.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2128 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2128 regsvr32.exe Token: SeSecurityPrivilege 2292 msiexec.exe Token: SeSecurityPrivilege 2292 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2128 2336 regsvr32.exe 28 PID 2336 wrote to memory of 2128 2336 regsvr32.exe 28 PID 2336 wrote to memory of 2128 2336 regsvr32.exe 28 PID 2336 wrote to memory of 2128 2336 regsvr32.exe 28 PID 2336 wrote to memory of 2128 2336 regsvr32.exe 28 PID 2336 wrote to memory of 2128 2336 regsvr32.exe 28 PID 2336 wrote to memory of 2128 2336 regsvr32.exe 28 PID 2128 wrote to memory of 2292 2128 regsvr32.exe 31 PID 2128 wrote to memory of 2292 2128 regsvr32.exe 31 PID 2128 wrote to memory of 2292 2128 regsvr32.exe 31 PID 2128 wrote to memory of 2292 2128 regsvr32.exe 31 PID 2128 wrote to memory of 2292 2128 regsvr32.exe 31 PID 2128 wrote to memory of 2292 2128 regsvr32.exe 31 PID 2128 wrote to memory of 2292 2128 regsvr32.exe 31 PID 2128 wrote to memory of 2292 2128 regsvr32.exe 31 PID 2128 wrote to memory of 2292 2128 regsvr32.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1f41fd3e96ef1c1328d08ced03ac5e1b717a45cda8cf94a1c4ffe775e43623b8.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1f41fd3e96ef1c1328d08ced03ac5e1b717a45cda8cf94a1c4ffe775e43623b8.dll3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2292
-