Analysis
-
max time kernel
1174s -
max time network
1177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231201-en -
resource tags
arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2023 11:25
Static task
static1
Behavioral task
behavioral1
Sample
april17.dll
Resource
win7-20231130-en
General
-
Target
april17.dll
-
Size
446KB
-
MD5
cd39fa1ea4f0c4c9c2dd8492ff597250
-
SHA1
8bae4934e78c738ed60f631bc67db34604d35818
-
SHA256
372bae872e2a2180f04ff14f8fb9f769d733cb4608d37e2bf6e61fee5d396018
-
SHA512
a0d3d131f1be227c6617fdea3a79c0c07427fa855273534951cd6da87d49a7fabf636ae4e109541e680536920fb2a4cfc48b961ff10e2ad13e81adb396dc1371
-
SSDEEP
6144:t1/Zy7Ge5qC9axTeJNZ/AuVEpsm8uchgwgKFV0HgdLtF23JQUWjlRdvJ:tZ33fiNZI6m4330HQf24dvJ
Malware Config
Extracted
zloader
apr17
spam
http://wmwifbajxxbcxmucxmlc.com/post.php
http://ojnxjgfjlftfkkuxxiqd.com/post.php
http://pwkqhdgytsshkoibaake.com/post.php
http://snnmnkxdhflwgthqismb.com/post.php
http://iawfqecrwohcxnhwtofa.com/post.php
http://nlbmfsyplohyaicmxhum.com/post.php
http://fvqlkgedqjiqgapudkgq.com/post.php
http://cmmxhurildiigqghlryq.com/post.php
http://nmqsmbiabjdnuushksas.com/post.php
http://fyratyubvflktyyjiqgq.com/post.php
-
build_id
108
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4156 set thread context of 3508 4156 rundll32.exe 97 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3508 msiexec.exe Token: SeSecurityPrivilege 3508 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3900 wrote to memory of 4156 3900 rundll32.exe 59 PID 3900 wrote to memory of 4156 3900 rundll32.exe 59 PID 3900 wrote to memory of 4156 3900 rundll32.exe 59 PID 4156 wrote to memory of 3508 4156 rundll32.exe 97 PID 4156 wrote to memory of 3508 4156 rundll32.exe 97 PID 4156 wrote to memory of 3508 4156 rundll32.exe 97 PID 4156 wrote to memory of 3508 4156 rundll32.exe 97 PID 4156 wrote to memory of 3508 4156 rundll32.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\april17.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\april17.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-