Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220715-en -
submitted
20-07-2022 17:05
Behavioral task
behavioral1
Sample
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe
Resource
win10v2004-20220718-en
General
-
Target
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe
-
Size
16KB
-
MD5
3c6ccad2b6665c5a4469ba535aa77609
-
SHA1
f88b51c5d63ff252b4cf4fe0bb9c2ac72f06fb07
-
SHA256
4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a
-
SHA512
478d5a2c6370e5c3b8ecef4b8a30955209b32f19f3fb681e87e66ce498f2013110a5c3febef8a098470adf9e36e224508aa09f178cad161f3000aea59d6e4130
-
SSDEEP
384:EyXvpPCuH19GTXjdhhPuujYcV6AUwJFZb:EKVlV9Ah5fYcV6Dw9b
Malware Config
Extracted
loaderbot
https://fruitive-women.000webhostapp.com/cmd.php
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1048-54-0x0000000000B00000-0x0000000000B0A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe" 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe" 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 976 schtasks.exe 1548 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe Token: SeDebugPrivilege 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1984 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 26 PID 1048 wrote to memory of 1984 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 26 PID 1048 wrote to memory of 1984 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 26 PID 1048 wrote to memory of 1984 1048 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 26 PID 1984 wrote to memory of 976 1984 cmd.exe 28 PID 1984 wrote to memory of 976 1984 cmd.exe 28 PID 1984 wrote to memory of 976 1984 cmd.exe 28 PID 1984 wrote to memory of 976 1984 cmd.exe 28 PID 1156 wrote to memory of 572 1156 taskeng.exe 31 PID 1156 wrote to memory of 572 1156 taskeng.exe 31 PID 1156 wrote to memory of 572 1156 taskeng.exe 31 PID 1156 wrote to memory of 572 1156 taskeng.exe 31 PID 572 wrote to memory of 1724 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 32 PID 572 wrote to memory of 1724 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 32 PID 572 wrote to memory of 1724 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 32 PID 572 wrote to memory of 1724 572 4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe 32 PID 1724 wrote to memory of 1548 1724 cmd.exe 34 PID 1724 wrote to memory of 1548 1724 cmd.exe 34 PID 1724 wrote to memory of 1548 1724 cmd.exe 34 PID 1724 wrote to memory of 1548 1724 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe"C:\Users\Admin\AppData\Local\Temp\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:976
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {00EDCD4D-4CFC-4A4B-B059-C8A67856DD4D} S-1-5-21-3440072777-2118400376-1759599358-1000:NKWDSIWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exeC:\Users\Admin\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\4e9a2e0dbcbd228d719037aa6320cbf5a37ba98e0620613f71e572ec7fba7b4a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f4⤵
- Creates scheduled task(s)
PID:1548
-
-
-