Analysis
-
max time kernel
152s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04/06/2022, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe
Resource
win10v2004-20220414-en
General
-
Target
100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe
-
Size
16KB
-
MD5
70798800aec7024b69c2336870dedf99
-
SHA1
092274ed9a344e900de2607b85e2ce00a8cb807f
-
SHA256
100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2
-
SHA512
a481226a2c12623cc1a223972e12dd8730cde86ea46105aa6a48b7bd4cae1f50d637c869bc0af4c57b64203137a23ee4b5ca70b638ee51640918f1dfd4cb2a1b
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1372-54-0x00000000003D0000-0x00000000003DA000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe" 100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2016 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1372 100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1372 100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1372 100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1640 1372 100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe 28 PID 1372 wrote to memory of 1640 1372 100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe 28 PID 1372 wrote to memory of 1640 1372 100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe 28 PID 1372 wrote to memory of 1640 1372 100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe 28 PID 1640 wrote to memory of 2016 1640 cmd.exe 30 PID 1640 wrote to memory of 2016 1640 cmd.exe 30 PID 1640 wrote to memory of 2016 1640 cmd.exe 30 PID 1640 wrote to memory of 2016 1640 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe"C:\Users\Admin\AppData\Local\Temp\100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\100dd44ee415826b58785562f354d14adb979a9ad62d59e776ac0a7da19cc4b2.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:2016
-
-