Analysis
-
max time kernel
151s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
05/01/2022, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe
-
Size
2.3MB
-
MD5
6e36f2949030dc1dfc452656c453bce9
-
SHA1
2889981168c1b3537cd00c98d49b2b7fc48f8075
-
SHA256
58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03
-
SHA512
2baf28ee9a66f3cf04efc725c8af8a7a858f28d11f23d29627562f0459c12a4fc515b1e69e2c81cbfd62f1fb51b17d092494672b25f6f2299810e8a68250bc84
Score
10/10
Malware Config
Signatures
-
LoaderBot executable 3 IoCs
resource yara_rule behavioral1/memory/2068-115-0x0000000001120000-0x000000000157B000-memory.dmp loaderbot behavioral1/memory/2068-120-0x0000000001120000-0x000000000157B000-memory.dmp loaderbot behavioral1/memory/2068-121-0x0000000001120000-0x000000000157B000-memory.dmp loaderbot -
Executes dropped EXE 1 IoCs
pid Process 2828 Driver.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe" 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 620 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe Token: SeLockMemoryPrivilege 2828 Driver.exe Token: SeLockMemoryPrivilege 2828 Driver.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2828 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 70 PID 2068 wrote to memory of 2828 2068 58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe"C:\Users\Admin\AppData\Local\Temp\58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2828
-