Resubmissions
31-10-2020 05:41
201031-a4vqedhr2n 10Analysis
-
max time kernel
1159s -
max time network
1164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2023 11:26
Static task
static1
Behavioral task
behavioral1
Sample
ZnVmZdD.dll
Resource
win7-20231023-en
General
-
Target
ZnVmZdD.dll
-
Size
539KB
-
MD5
a070bb84c2735c67a3f6154dc403f7d0
-
SHA1
fac8a42c17a0f19760a8596980707278de24556c
-
SHA256
4553d627f2509e19e9b84491c08ec9854d785df4f74e900b969c57ccd244c086
-
SHA512
bd32cd6ae1caea1722bf0df36a6952ba9381afcd45423231a761b8df692c3364172ea04637fc9a8a242a1a363931db8248c89024aace5b65383eeabbdcd4f7db
-
SSDEEP
12288:2fgs/ArUJRabXDUMr6xziFHPSMI0VI/+m3Ian:2fZY2an/JzxOD4an
Malware Config
Extracted
zloader
Apr14
Spam
http://wmwifbajxxbcxmucxmlc.com/post.php
http://ojnxjgfjlftfkkuxxiqd.com/post.php
http://pwkqhdgytsshkoibaake.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fyratyubvflktyyjiqgq.com/post.php
-
build_id
102
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4868 set thread context of 4368 4868 rundll32.exe 108 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 4368 msiexec.exe Token: SeSecurityPrivilege 4368 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4868 4988 rundll32.exe 87 PID 4988 wrote to memory of 4868 4988 rundll32.exe 87 PID 4988 wrote to memory of 4868 4988 rundll32.exe 87 PID 4868 wrote to memory of 4368 4868 rundll32.exe 108 PID 4868 wrote to memory of 4368 4868 rundll32.exe 108 PID 4868 wrote to memory of 4368 4868 rundll32.exe 108 PID 4868 wrote to memory of 4368 4868 rundll32.exe 108 PID 4868 wrote to memory of 4368 4868 rundll32.exe 108
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ZnVmZdD.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ZnVmZdD.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-