Analysis
-
max time kernel
171s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-05-2022 20:02
Static task
static1
Behavioral task
behavioral1
Sample
04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe
Resource
win10v2004-20220414-en
General
-
Target
04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe
-
Size
16KB
-
MD5
74cec46b3ad543d616bc72e66a39e257
-
SHA1
3993d82832157eaf2fc730b8895c1c1cbc73c7bb
-
SHA256
04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b
-
SHA512
906686127265006827de99629da0acc123bb4ba56645e63291ae00cc214310a6b898e17f53b7df08e5139b54ae1307596b4edd7a16efb0d700b8842f9a03384c
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1668-54-0x0000000001370000-0x000000000137A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe" 04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1668 04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1668 04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1668 04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1988 1668 04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe 28 PID 1668 wrote to memory of 1988 1668 04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe 28 PID 1668 wrote to memory of 1988 1668 04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe 28 PID 1668 wrote to memory of 1988 1668 04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe 28 PID 1988 wrote to memory of 848 1988 cmd.exe 30 PID 1988 wrote to memory of 848 1988 cmd.exe 30 PID 1988 wrote to memory of 848 1988 cmd.exe 30 PID 1988 wrote to memory of 848 1988 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe"C:\Users\Admin\AppData\Local\Temp\04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\04c3e3dc2e154633fab73894b7f687c01fce25bbea047ffcb691471ded68951b.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:848
-
-