Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220715-en -
submitted
20-07-2022 17:05
Behavioral task
behavioral1
Sample
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe
Resource
win10v2004-20220718-en
General
-
Target
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe
-
Size
16KB
-
MD5
3c6ccad2b6665c5a4469ba535aa77609
-
SHA1
f88b51c5d63ff252b4cf4fe0bb9c2ac72f06fb07
-
SHA256
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a
-
SHA512
478d5a2c6370e5c3b8ecef4b8a30955209b32f19f3fb681e87e66ce498f2013110a5c3febef8a098470adf9e36e224508aa09f178cad161f3000aea59d6e4130
-
SSDEEP
384:EyXvpPCuH19GTXjdhhPuujYcV6AUwJFZb:EKVlV9Ah5fYcV6Dw9b
Malware Config
Extracted
loaderbot
https://fruitive-women.000webhostapp.com/cmd.php
Signatures
-
LoaderBot executable 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1048-54-0x0000000000B00000-0x0000000000B0A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
Processes:
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe" 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe" 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exepid process 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exepid process 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exedescription pid process Token: SeDebugPrivilege 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe Token: SeDebugPrivilege 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.execmd.exetaskeng.exe4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.execmd.exedescription pid process target process PID 1048 wrote to memory of 1984 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe cmd.exe PID 1048 wrote to memory of 1984 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe cmd.exe PID 1048 wrote to memory of 1984 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe cmd.exe PID 1048 wrote to memory of 1984 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe cmd.exe PID 1984 wrote to memory of 976 1984 cmd.exe schtasks.exe PID 1984 wrote to memory of 976 1984 cmd.exe schtasks.exe PID 1984 wrote to memory of 976 1984 cmd.exe schtasks.exe PID 1984 wrote to memory of 976 1984 cmd.exe schtasks.exe PID 1156 wrote to memory of 572 1156 taskeng.exe 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe PID 1156 wrote to memory of 572 1156 taskeng.exe 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe PID 1156 wrote to memory of 572 1156 taskeng.exe 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe PID 1156 wrote to memory of 572 1156 taskeng.exe 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe PID 572 wrote to memory of 1724 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe cmd.exe PID 572 wrote to memory of 1724 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe cmd.exe PID 572 wrote to memory of 1724 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe cmd.exe PID 572 wrote to memory of 1724 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe cmd.exe PID 1724 wrote to memory of 1548 1724 cmd.exe schtasks.exe PID 1724 wrote to memory of 1548 1724 cmd.exe schtasks.exe PID 1724 wrote to memory of 1548 1724 cmd.exe schtasks.exe PID 1724 wrote to memory of 1548 1724 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe"C:\Users\Admin\AppData\Local\Temp\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:976
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {00EDCD4D-4CFC-4A4B-B059-C8A67856DD4D} S-1-5-21-3440072777-2118400376-1759599358-1000:NKWDSIWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exeC:\Users\Admin\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f4⤵
- Creates scheduled task(s)
PID:1548
-
-
-