Analysis
-
max time kernel
173s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 06:53
Static task
static1
Behavioral task
behavioral1
Sample
115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe
Resource
win10v2004-20220414-en
General
-
Target
115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe
-
Size
16KB
-
MD5
bf58b0bcecc1b577f317dd2a6d47ad10
-
SHA1
b778e57500fe1714e35d02370d9698f4d03162c2
-
SHA256
115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5
-
SHA512
ac428aa707479b903fa27cadc30dab3257d91b81877ce7512d40ef91708b4095e791463aaa962d317183f8398d3758e51e83fe61c80bd338703dd4e74c27ad8b
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1304-54-0x0000000000120000-0x000000000012A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe" 115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1304 115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1304 115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1304 115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1304 wrote to memory of 956 1304 115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe 28 PID 1304 wrote to memory of 956 1304 115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe 28 PID 1304 wrote to memory of 956 1304 115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe 28 PID 1304 wrote to memory of 956 1304 115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe 28 PID 956 wrote to memory of 1620 956 cmd.exe 30 PID 956 wrote to memory of 1620 956 cmd.exe 30 PID 956 wrote to memory of 1620 956 cmd.exe 30 PID 956 wrote to memory of 1620 956 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe"C:\Users\Admin\AppData\Local\Temp\115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\115ea566044825f30f36bc7c92ec830bcef548873a45fd184e6422b43ee1fca5.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:1620
-
-