Analysis
-
max time kernel
171s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20220718-en -
submitted
01-08-2022 16:25
Behavioral task
behavioral1
Sample
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe
Resource
win10v2004-20220721-en
General
-
Target
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe
-
Size
16KB
-
MD5
c0b012940a1af20a1a1ea6009f7b0faa
-
SHA1
d50c830572bd7d097606458cc4bdeeab16c1e589
-
SHA256
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba
-
SHA512
3b41136dd0b8dc9adb953d7f48a30478afc50f0e5126084639fa8ef450e84d6cdda2190fd61ad3a32198d7e8bce373975d7b30fa9063866ebedd2c728311861c
-
SSDEEP
384:xCdvSPlZH19GTXjdh8DZuujYcV6AUwJFZb:x0wnV9AhgZfYcV6Dw9b
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1988-54-0x0000000000A10000-0x0000000000A1A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
Processes:
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe" 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe" 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1412 schtasks.exe 1028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exepid process 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exepid process 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exedescription pid process Token: SeDebugPrivilege 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe Token: SeDebugPrivilege 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.execmd.exetaskeng.exe5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.execmd.exedescription pid process target process PID 1988 wrote to memory of 1780 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe cmd.exe PID 1988 wrote to memory of 1780 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe cmd.exe PID 1988 wrote to memory of 1780 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe cmd.exe PID 1988 wrote to memory of 1780 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe cmd.exe PID 1780 wrote to memory of 1412 1780 cmd.exe schtasks.exe PID 1780 wrote to memory of 1412 1780 cmd.exe schtasks.exe PID 1780 wrote to memory of 1412 1780 cmd.exe schtasks.exe PID 1780 wrote to memory of 1412 1780 cmd.exe schtasks.exe PID 1520 wrote to memory of 1536 1520 taskeng.exe 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe PID 1520 wrote to memory of 1536 1520 taskeng.exe 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe PID 1520 wrote to memory of 1536 1520 taskeng.exe 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe PID 1520 wrote to memory of 1536 1520 taskeng.exe 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe PID 1536 wrote to memory of 1052 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe cmd.exe PID 1536 wrote to memory of 1052 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe cmd.exe PID 1536 wrote to memory of 1052 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe cmd.exe PID 1536 wrote to memory of 1052 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe cmd.exe PID 1052 wrote to memory of 1028 1052 cmd.exe schtasks.exe PID 1052 wrote to memory of 1028 1052 cmd.exe schtasks.exe PID 1052 wrote to memory of 1028 1052 cmd.exe schtasks.exe PID 1052 wrote to memory of 1028 1052 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe"C:\Users\Admin\AppData\Local\Temp\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:1412
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1842259C-14F5-4BB1-890B-C1952EFA4672} S-1-5-21-3762437355-3468409815-1164039494-1000:TZEOUYSL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exeC:\Users\Admin\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f4⤵
- Creates scheduled task(s)
PID:1028
-
-
-