Analysis
-
max time kernel
1161s -
max time network
1166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2023 09:45
Static task
static1
Behavioral task
behavioral1
Sample
3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll
Resource
win10v2004-20231127-en
General
-
Target
3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll
-
Size
421KB
-
MD5
061506b2a0a26fbd20dba69a1105e1b7
-
SHA1
a4f4bc27be3da2b85a06883615bb96b8a2a79ebb
-
SHA256
3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9
-
SHA512
4426c072cb52f2e4ce35ca88c4f20304145d017b5e95f2d35aa68216691b6abde99b6941e1067e50b77342300dea329cb0facbc5ab391272ced658dcf5ee2be9
-
SSDEEP
6144:tZXN7S2y8WA3gha780p2F2V6voOy5Gn7n0O8N5WYeXmseY1rmWd2KWJ:tjS2yhA30a78rQqIN5te20qWd2KWJ
Malware Config
Extracted
zloader
April23Fixed
April23Fixed
http://wmwifbajxxbcxmucxmlc.com/post.php
http://onfovdaqqrwbvdfoqnof.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
-
build_id
120
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1936 set thread context of 3936 1936 rundll32.exe 109 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3936 msiexec.exe Token: SeSecurityPrivilege 3936 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4360 wrote to memory of 1936 4360 rundll32.exe 86 PID 4360 wrote to memory of 1936 4360 rundll32.exe 86 PID 4360 wrote to memory of 1936 4360 rundll32.exe 86 PID 1936 wrote to memory of 3936 1936 rundll32.exe 109 PID 1936 wrote to memory of 3936 1936 rundll32.exe 109 PID 1936 wrote to memory of 3936 1936 rundll32.exe 109 PID 1936 wrote to memory of 3936 1936 rundll32.exe 109 PID 1936 wrote to memory of 3936 1936 rundll32.exe 109
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b4b2c5c8a00fab59684fee37b54912c58682022e2dc4e3dcd24b6e58533ecd9.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-