Analysis
-
max time kernel
154s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04/06/2022, 16:16 UTC
Static task
static1
Behavioral task
behavioral1
Sample
0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe
Resource
win10v2004-20220414-en
General
-
Target
0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe
-
Size
16KB
-
MD5
4bb1908985f7e7187d48135f7134640d
-
SHA1
c3de2eb8ae7a6799af8690122c2d9e7b2bf9614e
-
SHA256
0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225
-
SHA512
4171ec388da7b40bc1dce787cd13b86f4caa7a84db80e19e3b064c170a3bfb6dfa5e7991da82cf42dc4a765301d13e1186d3ab8eb0db7c1401c8087403cd9017
Malware Config
Signatures
-
suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses
suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/4532-131-0x0000000000D20000-0x0000000000D2A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe" 0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4532 0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4532 0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4532 0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4532 wrote to memory of 456 4532 0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe 79 PID 4532 wrote to memory of 456 4532 0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe 79 PID 4532 wrote to memory of 456 4532 0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe 79 PID 456 wrote to memory of 5036 456 cmd.exe 81 PID 456 wrote to memory of 5036 456 cmd.exe 81 PID 456 wrote to memory of 5036 456 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe"C:\Users\Admin\AppData\Local\Temp\0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:5036
-
-
Network
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
Remote address:8.8.8.8:53Requestmoneyhustling.ruIN AResponse
-
2.8kB 8.6kB 19 19
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe186 B 308 B 3 3
DNS Request
moneyhustling.ru
DNS Request
moneyhustling.ru
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe186 B 308 B 3 3
DNS Request
moneyhustling.ru
DNS Request
moneyhustling.ru
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe124 B 185 B 2 2
DNS Request
moneyhustling.ru
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe186 B 369 B 3 3
DNS Request
moneyhustling.ru
DNS Request
moneyhustling.ru
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru
-
8.8.8.8:53moneyhustling.rudns0f3c8120834e15002d21e58a743eca4a9475367604fd0b570b9980d719135225.exe62 B 123 B 1 1
DNS Request
moneyhustling.ru