Analysis
-
max time kernel
1171s -
max time network
1172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231201-en -
resource tags
arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2023 10:30
Static task
static1
Behavioral task
behavioral1
Sample
zloader.dll
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
zloader.dll
Resource
win10v2004-20231201-en
General
-
Target
zloader.dll
-
Size
472KB
-
MD5
dea7ef874f21922114e030ab165635e4
-
SHA1
478431cb35563783340cbfd69f5eef74a808f5bf
-
SHA256
d538dfafbdf6ac115c24dbdd68c65dbef6460808dd2c4f3fc01d5e15bfc2f902
-
SHA512
eab49f24a3b6772dcf753bd31119eb1c3d863c15dfce577fcd52c2688d18364d6708e40f53d76bf59747f592ada8b71be24f4bb52fb69ebbc07927fe0bee60fe
-
SSDEEP
12288:zayq7dYtaR2FV9DAuuasxaunyIVTyMAzj:zxvta+jmnlVTIzj
Malware Config
Extracted
zloader
April24misha
April24misha
http://wmwifbajxxbcxmucxmlc.com/post.php
http://onfovdaqqrwbvdfoqnof.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
-
build_id
122
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4756 set thread context of 3468 4756 rundll32.exe 97 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3468 msiexec.exe Token: SeSecurityPrivilege 3468 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4756 4056 rundll32.exe 27 PID 4056 wrote to memory of 4756 4056 rundll32.exe 27 PID 4056 wrote to memory of 4756 4056 rundll32.exe 27 PID 4756 wrote to memory of 3468 4756 rundll32.exe 97 PID 4756 wrote to memory of 3468 4756 rundll32.exe 97 PID 4756 wrote to memory of 3468 4756 rundll32.exe 97 PID 4756 wrote to memory of 3468 4756 rundll32.exe 97 PID 4756 wrote to memory of 3468 4756 rundll32.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zloader.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zloader.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-