Analysis
-
max time kernel
1129s -
max time network
1135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2023 12:47
Static task
static1
Behavioral task
behavioral1
Sample
cc87e6581ca91f941f65332b2de0e681d58491b54aff9d0b30afae828a5f5790.dll
Resource
win7-20231020-en
General
-
Target
cc87e6581ca91f941f65332b2de0e681d58491b54aff9d0b30afae828a5f5790.dll
-
Size
539KB
-
MD5
2169e871d4ca668d1872722d1a0695dc
-
SHA1
add2bbbac042c328ed71c9fd2efcb9cbce5a89f7
-
SHA256
cc87e6581ca91f941f65332b2de0e681d58491b54aff9d0b30afae828a5f5790
-
SHA512
fdb93959e88f9cf59be9c515127d02ec41b1370544c23a82b51a49f51b611231e91549a043d7796acef4e95539c75f8a95046b2b31ea0011104a2762b2504c64
-
SSDEEP
12288:2fgs/ArUlRabXDUMr6xziFHPSMI0VI/+m3Ian:2fZY2an/JzxOD4an
Malware Config
Extracted
zloader
Apr14
Spam
http://wmwifbajxxbcxmucxmlc.com/post.php
http://ojnxjgfjlftfkkuxxiqd.com/post.php
http://pwkqhdgytsshkoibaake.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fyratyubvflktyyjiqgq.com/post.php
-
build_id
102
Signatures
-
Blocklisted process makes network request 13 IoCs
flow pid Process 74 1936 msiexec.exe 75 1936 msiexec.exe 77 1936 msiexec.exe 84 1936 msiexec.exe 85 1936 msiexec.exe 108 1936 msiexec.exe 109 1936 msiexec.exe 112 1936 msiexec.exe 113 1936 msiexec.exe 135 1936 msiexec.exe 136 1936 msiexec.exe 140 1936 msiexec.exe 141 1936 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4360 set thread context of 1936 4360 rundll32.exe 104 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1936 msiexec.exe Token: SeSecurityPrivilege 1936 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4320 wrote to memory of 4360 4320 rundll32.exe 84 PID 4320 wrote to memory of 4360 4320 rundll32.exe 84 PID 4320 wrote to memory of 4360 4320 rundll32.exe 84 PID 4360 wrote to memory of 1936 4360 rundll32.exe 104 PID 4360 wrote to memory of 1936 4360 rundll32.exe 104 PID 4360 wrote to memory of 1936 4360 rundll32.exe 104 PID 4360 wrote to memory of 1936 4360 rundll32.exe 104 PID 4360 wrote to memory of 1936 4360 rundll32.exe 104
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc87e6581ca91f941f65332b2de0e681d58491b54aff9d0b30afae828a5f5790.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc87e6581ca91f941f65332b2de0e681d58491b54aff9d0b30afae828a5f5790.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD537883aa7c0d6e92c04a350d04ea33fda
SHA1a3f52fc0e5e112190b2ff79528c3ff5bfd3d216b
SHA25672eb0b7d8ddb3f5f391cef068fd50b63fc0288846c36427a23b4e93c8ed431dc
SHA512b65bf9a2ab1c740b7ed76d7d39621917d36f8d4d9edf3166b76d326fe95b443f7a757c2c98b1988b9bac65f4f0f4f2fc4a47c35ee76702b147e1a279a66a164d