Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-06-2022 22:51
Static task
static1
Behavioral task
behavioral1
Sample
b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe
Resource
win10v2004-20220414-en
General
-
Target
b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe
-
Size
16KB
-
MD5
69883cd448e52fa2ffcd181f5b767665
-
SHA1
6f20034d07e405929e58187f8373bfca80778d88
-
SHA256
b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1
-
SHA512
6dc0cf81015cf441549757a4c9c0d83d9079599e598248c90c9d00d6f07721f848fcc89db216f10bae5f3086acf923b1712c4f4adaa80da7d7129ce277959df6
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1740-54-0x0000000000030000-0x000000000003A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe" b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe" b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1480 schtasks.exe 1068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe 1308 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1740 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1740 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe Token: SeDebugPrivilege 1308 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1344 1740 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe 28 PID 1740 wrote to memory of 1344 1740 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe 28 PID 1740 wrote to memory of 1344 1740 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe 28 PID 1740 wrote to memory of 1344 1740 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe 28 PID 1344 wrote to memory of 1480 1344 cmd.exe 30 PID 1344 wrote to memory of 1480 1344 cmd.exe 30 PID 1344 wrote to memory of 1480 1344 cmd.exe 30 PID 1344 wrote to memory of 1480 1344 cmd.exe 30 PID 760 wrote to memory of 1308 760 taskeng.exe 33 PID 760 wrote to memory of 1308 760 taskeng.exe 33 PID 760 wrote to memory of 1308 760 taskeng.exe 33 PID 760 wrote to memory of 1308 760 taskeng.exe 33 PID 1308 wrote to memory of 1324 1308 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe 34 PID 1308 wrote to memory of 1324 1308 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe 34 PID 1308 wrote to memory of 1324 1308 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe 34 PID 1308 wrote to memory of 1324 1308 b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe 34 PID 1324 wrote to memory of 1068 1324 cmd.exe 36 PID 1324 wrote to memory of 1068 1324 cmd.exe 36 PID 1324 wrote to memory of 1068 1324 cmd.exe 36 PID 1324 wrote to memory of 1068 1324 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe"C:\Users\Admin\AppData\Local\Temp\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:1480
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7CF56853-8432-425F-B153-B73A604E7E7A} S-1-5-21-2277218442-1199762539-2004043321-1000:AUVQQRRF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Roaming\Windows\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exeC:\Users\Admin\AppData\Roaming\Windows\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\b038f02fce2c8584b6d610ef74cd884821c14570c388f441270ba0efef9ff7e1.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f4⤵
- Creates scheduled task(s)
PID:1068
-
-
-