Analysis
-
max time kernel
152s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 09:17
Static task
static1
Behavioral task
behavioral1
Sample
2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe
Resource
win10v2004-20220414-en
General
-
Target
2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe
-
Size
16KB
-
MD5
63a66bc97597efb0f054ace7627c3e0f
-
SHA1
450d624457dbfd3495ba7a0f6c1291797c479a35
-
SHA256
2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb
-
SHA512
89f169307160848b2bc69ba2bf71b8ebb0866603909de6b61d324149c21788a1e582d1be00cf410d2f18eaa85fc4a8d736d484f1b30928ac58ece70d1371ef2b
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/812-54-0x0000000001020000-0x000000000102A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe" 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe" 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1360 schtasks.exe 1984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 812 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe 1816 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 812 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 812 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe Token: SeDebugPrivilege 1816 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 812 wrote to memory of 2008 812 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe 27 PID 812 wrote to memory of 2008 812 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe 27 PID 812 wrote to memory of 2008 812 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe 27 PID 812 wrote to memory of 2008 812 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe 27 PID 2008 wrote to memory of 1360 2008 cmd.exe 29 PID 2008 wrote to memory of 1360 2008 cmd.exe 29 PID 2008 wrote to memory of 1360 2008 cmd.exe 29 PID 2008 wrote to memory of 1360 2008 cmd.exe 29 PID 1092 wrote to memory of 1816 1092 taskeng.exe 32 PID 1092 wrote to memory of 1816 1092 taskeng.exe 32 PID 1092 wrote to memory of 1816 1092 taskeng.exe 32 PID 1092 wrote to memory of 1816 1092 taskeng.exe 32 PID 1816 wrote to memory of 316 1816 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe 33 PID 1816 wrote to memory of 316 1816 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe 33 PID 1816 wrote to memory of 316 1816 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe 33 PID 1816 wrote to memory of 316 1816 2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe 33 PID 316 wrote to memory of 1984 316 cmd.exe 35 PID 316 wrote to memory of 1984 316 cmd.exe 35 PID 316 wrote to memory of 1984 316 cmd.exe 35 PID 316 wrote to memory of 1984 316 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe"C:\Users\Admin\AppData\Local\Temp\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:1360
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {4D6B0AA6-E497-40CE-A0FC-C94BE9F05F06} S-1-5-21-2277218442-1199762539-2004043321-1000:AUVQQRRF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Roaming\Windows\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exeC:\Users\Admin\AppData\Roaming\Windows\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\2137f5e07a5c40d2dc805bbe5142c0cb9c837907553b4aff5101229d79e9dabb.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f4⤵
- Creates scheduled task(s)
PID:1984
-
-
-