Analysis
-
max time kernel
111s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 17:24
Behavioral task
behavioral1
Sample
PentaPulse.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
PentaPulse.exe
-
Size
153KB
-
MD5
f70905e64d41d899e586fa1b43d8c65e
-
SHA1
98c0d8ea2cd4fb47cfca1c4871e1de0e4303591b
-
SHA256
771f327f1637897150eaaf1fb3fa25209b372d05e50b5000cdc4bee40f9447e9
-
SHA512
f758114e81df55161f7edeb0bada54647a8af586876688dc163bd780f582b72677bc2ecfc7df9deed45c1cfeb29ff5fdd9c530150e87719002d71dd282fab824
-
SSDEEP
3072:pbOmL8fzFQr0njTRsu1yIG9XKThCN3FBROfxD6ORvd05glsQ:cjTRda9yCXBROfxN051
Malware Config
Extracted
Family
zloader
Botnet
Bing_Mod3
Campaign
M1
C2
https://adslstickerni.world
rc4.plain
rsa_pubkey.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 15 532 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3308 set thread context of 532 3308 PentaPulse.exe 88 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3308 wrote to memory of 532 3308 PentaPulse.exe 88 PID 3308 wrote to memory of 532 3308 PentaPulse.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\PentaPulse.exe"C:\Users\Admin\AppData\Local\Temp\PentaPulse.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\System32\msiexec.exe\??\C:\Windows\System32\msiexec.exe2⤵
- Blocklisted process makes network request
PID:532
-