Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    03-03-2022 08:56

General

  • Target

    3a1b0cf20a31556d2372c4e16026ab0d.exe

  • Size

    4.0MB

  • MD5

    3a1b0cf20a31556d2372c4e16026ab0d

  • SHA1

    2efabc5b1eb697113b90d30c8eb165a2086776ad

  • SHA256

    ae5f1fd094029b7e60c1d7998501d17b7585254e1b0644f151b20bd83bf65e7a

  • SHA512

    43f6c7f093410ce3e0d7297a21b35a6dea1608300044ee172270249f2f1ef543eb0e866308e6a19af670d137b995bab162d7098ad0061c6638fd6898df63d6ab

Malware Config

Signatures

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • suricata: ET MALWARE CerberTear Ransomware CnC Checkin

    suricata: ET MALWARE CerberTear Ransomware CnC Checkin

  • LoaderBot executable 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a1b0cf20a31556d2372c4e16026ab0d.exe
    "C:\Users\Admin\AppData\Local\Temp\3a1b0cf20a31556d2372c4e16026ab0d.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 466XMc1Sg2BTtbHNM7y4yZaFPagsFBcrrMLnyqfw2tVNJePAoR3QMs8bJPJTXoHohXKsh4wgr46ouRFRzFztvpimGmHDLpv -p x -k -v=0 --donate-level=1 -t 1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4420
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4420 -s 764
        3⤵
        • Program crash
        PID:1396
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 466XMc1Sg2BTtbHNM7y4yZaFPagsFBcrrMLnyqfw2tVNJePAoR3QMs8bJPJTXoHohXKsh4wgr46ouRFRzFztvpimGmHDLpv -p x -k -v=0 --donate-level=1 -t 1
      2⤵
      • Executes dropped EXE
      PID:4160
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4160 -s 564
        3⤵
        • Program crash
        PID:4260
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 466XMc1Sg2BTtbHNM7y4yZaFPagsFBcrrMLnyqfw2tVNJePAoR3QMs8bJPJTXoHohXKsh4wgr46ouRFRzFztvpimGmHDLpv -p x -k -v=0 --donate-level=1 -t 1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3472
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3472 -s 840
        3⤵
        • Program crash
        PID:2800
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 466XMc1Sg2BTtbHNM7y4yZaFPagsFBcrrMLnyqfw2tVNJePAoR3QMs8bJPJTXoHohXKsh4wgr46ouRFRzFztvpimGmHDLpv -p x -k -v=0 --donate-level=1 -t 1
      2⤵
      • Executes dropped EXE
      PID:4788
    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 466XMc1Sg2BTtbHNM7y4yZaFPagsFBcrrMLnyqfw2tVNJePAoR3QMs8bJPJTXoHohXKsh4wgr46ouRFRzFztvpimGmHDLpv -p x -k -v=0 --donate-level=1 -t 1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1068
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 456 -p 4420 -ip 4420
    1⤵
      PID:4224
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 188 -p 4160 -ip 4160
      1⤵
        PID:696
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 444 -p 3472 -ip 3472
        1⤵
          PID:3932

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2620-136-0x00000000052C0000-0x00000000052C1000-memory.dmp

          Filesize

          4KB

        • memory/2620-130-0x0000000000590000-0x000000000098E000-memory.dmp

          Filesize

          4.0MB

        • memory/2620-132-0x00000000055D0000-0x0000000005636000-memory.dmp

          Filesize

          408KB

        • memory/2620-131-0x0000000074B6E000-0x0000000074B6F000-memory.dmp

          Filesize

          4KB

        • memory/3472-141-0x0000000001E70000-0x0000000001E90000-memory.dmp

          Filesize

          128KB

        • memory/3472-142-0x0000000001E90000-0x0000000001EB0000-memory.dmp

          Filesize

          128KB

        • memory/4420-135-0x00000000001D0000-0x00000000001E4000-memory.dmp

          Filesize

          80KB