Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09/06/2022, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe
Resource
win10v2004-20220414-en
General
-
Target
16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe
-
Size
16KB
-
MD5
de5528e24c37c5ae02da11e1a8a6805a
-
SHA1
220a340dae68bca5982e83e5cbfce4978ea296a0
-
SHA256
16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff
-
SHA512
92f9837d60990f99e19984f732af8480ecaa9b972de5edec926a4861b68f7ab082dff292298f06d9f48a2d21e7fcd5e51bb8765498666d64ed0edf215db83618
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/108-54-0x00000000011B0000-0x00000000011BA000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe" 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe" 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1816 schtasks.exe 528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 108 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe 1292 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 108 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 108 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe Token: SeDebugPrivilege 1292 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 108 wrote to memory of 1788 108 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe 27 PID 108 wrote to memory of 1788 108 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe 27 PID 108 wrote to memory of 1788 108 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe 27 PID 108 wrote to memory of 1788 108 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe 27 PID 1788 wrote to memory of 1816 1788 cmd.exe 29 PID 1788 wrote to memory of 1816 1788 cmd.exe 29 PID 1788 wrote to memory of 1816 1788 cmd.exe 29 PID 1788 wrote to memory of 1816 1788 cmd.exe 29 PID 1820 wrote to memory of 1292 1820 taskeng.exe 32 PID 1820 wrote to memory of 1292 1820 taskeng.exe 32 PID 1820 wrote to memory of 1292 1820 taskeng.exe 32 PID 1820 wrote to memory of 1292 1820 taskeng.exe 32 PID 1292 wrote to memory of 1792 1292 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe 33 PID 1292 wrote to memory of 1792 1292 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe 33 PID 1292 wrote to memory of 1792 1292 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe 33 PID 1292 wrote to memory of 1792 1292 16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe 33 PID 1792 wrote to memory of 528 1792 cmd.exe 35 PID 1792 wrote to memory of 528 1792 cmd.exe 35 PID 1792 wrote to memory of 528 1792 cmd.exe 35 PID 1792 wrote to memory of 528 1792 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe"C:\Users\Admin\AppData\Local\Temp\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:1816
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {828417CF-9337-481D-8580-8C61955731AF} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Roaming\Windows\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exeC:\Users\Admin\AppData\Roaming\Windows\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\16102849268d1abee19bc3c51b6e50f20e1ec69daccb0803be4211ac383179ff.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f4⤵
- Creates scheduled task(s)
PID:528
-
-
-