Resubmissions

13-02-2024 17:24

240213-vyxqpsdg4x 10

11-02-2024 01:16

240211-bmyzvaah4t 6

Analysis

  • max time kernel
    111s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2024 17:24

General

  • Target

    PentaPulse.exe

  • Size

    153KB

  • MD5

    f70905e64d41d899e586fa1b43d8c65e

  • SHA1

    98c0d8ea2cd4fb47cfca1c4871e1de0e4303591b

  • SHA256

    771f327f1637897150eaaf1fb3fa25209b372d05e50b5000cdc4bee40f9447e9

  • SHA512

    f758114e81df55161f7edeb0bada54647a8af586876688dc163bd780f582b72677bc2ecfc7df9deed45c1cfeb29ff5fdd9c530150e87719002d71dd282fab824

  • SSDEEP

    3072:pbOmL8fzFQr0njTRsu1yIG9XKThCN3FBROfxD6ORvd05glsQ:cjTRda9yCXBROfxN051

Malware Config

Extracted

Family

zloader

Botnet

Bing_Mod3

Campaign

M1

C2

https://adslstickerni.world

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Blocklisted process makes network request 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PentaPulse.exe
    "C:\Users\Admin\AppData\Local\Temp\PentaPulse.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3308
    • C:\Windows\System32\msiexec.exe
      \??\C:\Windows\System32\msiexec.exe
      2⤵
      • Blocklisted process makes network request
      PID:532

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/532-10-0x0000019A7CAD0000-0x0000019A7CB00000-memory.dmp

    Filesize

    192KB

  • memory/532-12-0x0000019A7CAD0000-0x0000019A7CB00000-memory.dmp

    Filesize

    192KB

  • memory/532-17-0x0000019A7EE70000-0x0000019A7F065000-memory.dmp

    Filesize

    2.0MB

  • memory/532-30-0x0000019A7CAD0000-0x0000019A7CB00000-memory.dmp

    Filesize

    192KB

  • memory/532-28-0x0000019A7CAD0000-0x0000019A7CB00000-memory.dmp

    Filesize

    192KB

  • memory/3308-0-0x000001886FD70000-0x000001886FF65000-memory.dmp

    Filesize

    2.0MB