Analysis
-
max time kernel
155s -
max time network
127s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10/01/2022, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
6e36f2949030dc1dfc452656c453bce9.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6e36f2949030dc1dfc452656c453bce9.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
6e36f2949030dc1dfc452656c453bce9.exe
-
Size
2.3MB
-
MD5
6e36f2949030dc1dfc452656c453bce9
-
SHA1
2889981168c1b3537cd00c98d49b2b7fc48f8075
-
SHA256
58eb4a506ed5299ddde9ed4a720796849b1de79fe939cd75feff353557d03b03
-
SHA512
2baf28ee9a66f3cf04efc725c8af8a7a858f28d11f23d29627562f0459c12a4fc515b1e69e2c81cbfd62f1fb51b17d092494672b25f6f2299810e8a68250bc84
Score
10/10
Malware Config
Signatures
-
LoaderBot executable 3 IoCs
resource yara_rule behavioral2/memory/2468-115-0x0000000000270000-0x00000000006CB000-memory.dmp loaderbot behavioral2/memory/2468-120-0x0000000000270000-0x00000000006CB000-memory.dmp loaderbot behavioral2/memory/2468-121-0x0000000000270000-0x00000000006CB000-memory.dmp loaderbot -
Executes dropped EXE 1 IoCs
pid Process 1312 Driver.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 6e36f2949030dc1dfc452656c453bce9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\6e36f2949030dc1dfc452656c453bce9.exe" 6e36f2949030dc1dfc452656c453bce9.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2468 6e36f2949030dc1dfc452656c453bce9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe 2468 6e36f2949030dc1dfc452656c453bce9.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 616 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2468 6e36f2949030dc1dfc452656c453bce9.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2468 6e36f2949030dc1dfc452656c453bce9.exe Token: SeLockMemoryPrivilege 1312 Driver.exe Token: SeLockMemoryPrivilege 1312 Driver.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1312 2468 6e36f2949030dc1dfc452656c453bce9.exe 70 PID 2468 wrote to memory of 1312 2468 6e36f2949030dc1dfc452656c453bce9.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e36f2949030dc1dfc452656c453bce9.exe"C:\Users\Admin\AppData\Local\Temp\6e36f2949030dc1dfc452656c453bce9.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1312
-